This content is viewable by Everyone
May 2023: URL Shortening Service Widely Abused in Attacks
Threat Alert: What to Watch For
- Cybercriminals have started using the URL shortening service clck[.]ru in widespread phishing attacks in April.
- The nature of these attacks and the lures used vary greatly. However, the attacks encourage recipients to click on a shortened URL ending in [.]ru.
- Clicking on the link can lead to various malicious outcomes, including credential phishing pages, adult spam, malicious files, and malicious software (malware) downloads.
Key Action: Report Suspicious Emails
- Report ANY suspicious emails using the Phish Alarm button in your email menu bar.
- Remember: Our organization occasionally sends phishing simulations that are used to evaluate the potential impact of a real phishing attack. Report any emails that match the tactics described above.
- If a reported message is a simulation, you will see a notification alerting you to that. No further action is needed on your part.
- If a reported message was not a simulation, and you are concerned about a time-sensitive request, you must take additional steps to verify the email is valid before acting on it.
Tips to Remember (at Work and at Home)
- Go beyond surface clues. Familiar logos, branding, and names are not automatic indicators that an email or website is safe. Cybercriminals often imitate well-known organizations.
- Verify the legitimacy of any unsolicited/unexpected email before you interact with it, especially if it directs you to click on a link or asks you to provide credentials. It can be tempting to click on a “call-to-action.” But if you notice a subtle change or inconsistency within a message, don’t ignore it—report it.
- Beware of shortened URLs. Remember, shortened URLs function as a mask for another link. This makes it difficult to be certain of the true destination for where these links lead.