This content is viewable by Everyone

May 2023: URL Shortening Service Widely Abused in Attacks

Threat Alert: What to Watch For

  • Cybercriminals have started using the URL shortening service clck[.]ru in widespread phishing attacks in April. 
  • The nature of these attacks and the lures used vary greatly. However, the attacks encourage recipients to click on a shortened URL ending in [.]ru. 
  • Clicking on the link can lead to various malicious outcomes, including credential phishing pages, adult spam, malicious files, and malicious software (malware) downloads. 

Key Action: Report Suspicious Emails

  • Report ANY suspicious emails using the Phish Alarm button in your email menu bar. 
  • Remember: Our organization occasionally sends phishing simulations that are used to evaluate the potential impact of a real phishing attack. Report any emails that match the tactics described above. 
  • If a reported message is a simulation, you will see a notification alerting you to that. No further action is needed on your part. 
  • If a reported message was not a simulation, and you are concerned about a time-sensitive request, you must take additional steps to verify the email is valid before acting on it. 

Tips to Remember (at Work and at Home)

  • Go beyond surface clues. Familiar logos, branding, and names are not automatic indicators that an email or website is safe. Cybercriminals often imitate well-known organizations.  
  • Verify the legitimacy of any unsolicited/unexpected email before you interact with it, especially if it directs you to click on a link or asks you to provide credentials. It can be tempting to click on a “call-to-action.” But if you notice a subtle change or inconsistency within a message, don’t ignore it—report it.
  • Beware of shortened URLs. Remember, shortened URLs function as a mask for another link. This makes it difficult to be certain of the true destination for where these links lead.