Itâs pronounced âfishing.â
Over the past few months, a number of phishing attacks have been carried out through Ohio Wesleyanâs email system. The attack gets its unusual name from the combination of âphreakingâ and âfishing.â Phreaking describes the study and exploration of telecommunication systems.
Fishing plays off the fact that attackers use an enticement, or bait, to get victims to turn over sensitive information.
Phishers will use a fraudulent message to lure victims to a website they control. The site will typically ask users to enter sensitive information, like usernames and passwords, which are then collected by the intruder. After the attacker records the victimsâ information, they often employ the recently stolen accounts to send more malicious messages.
Luckily, the OWU attacks have not involved solicitations for financial information.
Senior Sarah Richmond knew something was wrong when she realized she âwas locked out of [her] account from any computer or phone.â
âIt was very frustrating to not have access to my email account,â Richmond said. âBut Information Services (Infosys) was very helpful in getting me back into my account and helping protect it. They were very nice and straightforward.â
When InfoSys becomes aware of an attack, the first step is to determine who was impacted and âwhat information they provided to the attackers,â said Brian Rellinger, chief information officer for OWU. âThen we have students change their passwords to prevent further attacks originating from their account.â
Unfortunately, there is no statistic for how many students and faculty have been affected. âIt is difficult to establish an exact number,â said Rellinger.
There are also no real leads into who is behind the attacks. âRarely do we spend time trying to find the origin of the attack,â said Rellinger. âIf we did suspect the attack came from an OWU account holder, we would investigate further. But most attacks originate outside of OWU.â
Richmond pointed out that the messages sent to her account âcame from India and the Philippines, likely after bouncing off servers. You can find out where your email account is being accessed by looking at the details section at the bottom of the Gmail account.â
Rellinger explained that attacks âoccur in waves generally, and happen at all universities. In fact, a large number of universities are using the exact same system we are  Google Apps for Education.â
That system has a number of security features in place. According to Googleâs support documentation, their fraud detection and antiÂspam filters comply with industry standards.
âBorder firewalls, system firewalls, and the antiÂspam and antiÂphishing technologies included in Google Mail help mitigate risk as much as possible,â said Rellinger.
In addition to Googleâs builtÂin security, OWU is protected by the Sophos security suite.
Despite these measures, phishing attacks can and do occur. Ultimately, prevention comes down to the user. âNever provide birthday, SSN, or other sensitive data to a third party unless you are absolutely certain the information will be going to the appropriate entity,â said Rellinger.
âInformation Services staff will never ask you for your password or SSN.â
Editorâs Note: After the submission of this story, a series of phishing messages were sent by the email accounts of, among others, the Wesleyan Council on Student Affairs; the Honors Board; Meredith Dixon, Assistant Director of Residential Life (ResLife); and Director of ResLife Wendy Piper.
Thank you for writing this article Daniel! Well done.