Recognizing a phishing email is always a challenge. As artificial intelligence advances, and as more devices and users get connected with the Internet, it’s important for everyone to learn how to identify phishing emails and protect UD and yourself from these malicious threats.

Have you ever wondered how many phishing attempts are detected every day?

In August 2023, the number of phishing attempts detected worldwide each day was close to half the world’s population, or about 3.4 billion daily phishing emails! (source: aag-it.com).

With the fall semester in full swing, threat actors will become more active and try to exploit our weak spots. And the weakest spot in cybersecurity is us, human beings. Phishing emails are the easiest way for hackers to compromise our security.

While we used to rely on poor grammar or spelling errors, generative AI is already making those warning signs less useful. 

What are some ways to identify phishing emails?

Here’s an example of an email with some red flags you should look for to determine if someone sent you a phishing email:

phishing email example for Secure UD October 2023
  1. Does the email come from outside our organization (@udel.edu)?
  2. Have you received this email after regular business hours?
  3. Were you CC’d on an email sent to people you may not personally know?
  4. Is there urgency in the subject line, such as needing to respond or pay urgently?
  5. Does the sender set a short timeline or deadline to acknowledge or make payment?
  6. Does the content appear suspicious? For example, limited-time offers or something related to UD payroll, billing, or UD IT support from an unknown email ID, grammar and spelling mistakes, and unknown and untrusted links can indicate a phishing email.
  7. Does the attachment file name or extension seem suspicious? For example: “text_0.txt”, “YOL3NJP4WKMKDAQZSQTR.pdf”, “2023 Summer Open’s Application.docx”, or “Document shared with you Performance Review for Staff Membersdocx.pdf.

Security Hints and Tips: Unsafe Email Attachments

Many people use email in their personal life and their workplace. You can get an email from your aunt with her stew recipe or an email from your boss with a guest list for the office party. But what if the email isn’t actually from your aunt or boss? Cybercriminals often pretend to be someone you know to get you to click unsafe attachments, such as fake DOC or PDF files. Some of the most common attachments used for attacks are DOC and PDF files. It’s important to learn how to identify unsafe email attachments and protect yourself.

Fake DOC Attachments
Older Microsoft Word DOC files are commonly used in cyberattacks because they can include macros. A macro, short for macroinstruction, is a set of commands that can control a DOC file and other programs. Cybercriminals may send you an email with a DOC file that contains a macro. The email usually looks legitimate and gives an urgent reason for you to open the file. If you open the file, a pop-up window will display asking you to enable macros. If you accept, the macros will be able to install malware on your device.

Fake PDF Attachments
PDF files are sent over email every day, making them perfect tools for cyberattacks. One popular type of attack is when cybercriminals put an image in a PDF file to trick you into clicking it. For example, it could be an image that looks like a video with a play button. The image will be something that catches your attention, like a cooking video from social media or a cute cat video. Unfortunately, clicking the image could send you to a website designed to steal your sensitive information.

What can I do to stay safe?

  • If a suspicious email appears to be from someone you know, contact them over the phone or in person. Check to see if the email is legitimate before putting yourself at risk.
  • Avoid DOC files in general. They use an outdated format and contain too many security risks. The newer DOCX format is the current standard and is much safer.
  • Always think before you click. Cyberattacks are designed to catch you off guard and trick you into clicking impulsively.

Always report suspected phishing attempts right away

Remember, when you identify a suspicious email, forward it to reportaphish@udel.edu, even if you have already clicked on it. Reporting phishing emails helps to protect all users at UD.

Have you ever clicked on a phishing link and logged into an account that led you to suspect that your account may have been hacked or compromised? Do not panic. Fill out this Reporting Form or call 302-831-6000 as soon as possible and the UD Information Security team will help you. The sooner an event is reported, the more efficiently and effectively we can respond to it.