Self-Phishing

Staff member reviewing email on laptop

Know the warning signs

What is Phishing and Spear Phishing?

A phishing attack is when a criminal attempts to trick unsuspecting users into giving them their login information through an electronic communication. Most common to UBC are email messages sent with a deceptive link in the message that may appear to have one destination, but actually leads to another. Links may be disguised with lookalike domain names that are one letter off from legitimate ones when in actuality they redirect to a webpage that is a repository for the criminal to capture the victim’s login credentials.

Spear Phishing campaigns, on the other hand, appear to come from a trusted source that is closer to the target. Cybercriminals send these personalized emails to one person or a few persons who share a connection, such as working in the same department.

 

Aerial view of UBC Okanagan campus

What is 'Self-Phishing'?

One way that a criminal may attempt to obtain protected information that is critical to the security of the University is through a phishing attack. Whether or not the criminal is successful is often contingent upon establishing trust with their victim. In some cases it could simply be the criminal trying their luck!

The hard truth is that UBC is constantly being phished! Believe it or not, criminals typically use a customer relationship management tool to track the response rates and engagement statistics of their phishing campaigns so they can further target individuals who have already responded to a phish.

To help employees better understand how they can quickly spot some of the most common types of phishing and avoid falling victim to their attacks, the UBC Cybersecurity team has established a Self-Phishing training exercise. This means that, after first warning units that an ‘attack’ is imminent, we send our own phishing messages (crafted to look just like the criminals) to UBC employees!

Ongoing campaigns

With the support of local IT departments, these ongoing campaigns assist units, faculties, and the entire University to confront this nefarious activity before it escalates. The service is educational and not punitive. Campaign results are kept confidential and the collected results for individuals will not be shared with anyone, including your manager or co-workers. Information entered during the campaign, like usernames or passwords, is not retained and is not available for review by anyone including service operators.

Two staff members in conversation on Main Mall

The objective is to increase the reporting of phishing messages to security@ubc.ca and reduce success rates from the criminal’s perspective. Ideally, if we can make UBC "unresponsive" to criminals, then they will likely ‘move on’ to an easier and more responsive target.


Latest campaign

Data current as of: February 28, 2024

 

46,339

users targeted in the campaign

35%

opened the email

 

 

16%

clicked on the link

4.6%

submitted their data

 

 

3.2%

Reported the phish

 

 

Combined Historic Trend Graph

 

Frequently Asked Questions


UBC Crest The official logo of the University of British Columbia. Urgent Message An exclamation mark in a speech bubble. Caret An arrowhead indicating direction. Arrow An arrow indicating direction. Arrow in Circle An arrow indicating direction. Arrow in Circle An arrow indicating direction. Chats Two speech clouds. Facebook The logo for the Facebook social media service. Information The letter 'i' in a circle. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Location Pin A map location pin. Mail An envelope. Menu Three horizontal lines indicating a menu. Minus A minus sign. Telephone An antique telephone. Plus A plus symbol indicating more or the ability to add. Search A magnifying glass. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service. Bell Warning