A security analyst points to a button that Ohio State University email users can click to report suspected phishing messages, Friday, March 30, 2018 in Columbus. Ohio State is among schools using fake phishing messages to make students and employees more alert and adept at spotting real cybersecurity threats. (AP Photo/Kantele Franko)

A security analyst points to a button that Ohio State University email users can click to report suspected phishing messages, Friday, March 30, 2018 in Columbus. Ohio State is among schools using fake phishing messages to make students and employees more alert and adept at spotting real cybersecurity threats. (AP Photo/Kantele Franko)

COLUMBUS, Ohio (AP) — Thousands of university students and employees targeted by email phishing schemes this year have taken the bait. Fortunately, they were duped not by real scammers, but by their own schools — in simulations meant to make them more adept at spotting real threats.

When Ohio State University did its first student-focused phishing in January — a strategy also used in the corporate world — over 18 percent of the recipients clicked through. The University of Alabama at Birmingham’s employee-focused phishing awareness campaign snagged over 7,000 people in March, or about a quarter of the recipients.

ADVERTISEMENT

Ohio State sophomore Ezequiel Herrera, who prides himself on quickly responding to messages, was caught off guard twice by the fake phishing emails. The first time, he said, he felt proud his school was taking that kind of educational action. The second time left him frustrated.

“I was sort of like, ‘Wow, I’m really, really bad,’” Herrera, 19, said with a smile. Since then, he said, he has become more cautious while scrolling through emails from unfamiliar senders.

The faux phishing messages mimic emails about financial aid, holidays, resetting passwords or other topics but contain signs of potential fraud, such as generic greetings, requests for urgent action or information, spelling errors, and senders from unfamiliar domain names. Recipients who click links in the emails are redirected to tips about good cybersecurity habits and how to spot and report real attempts at stealing passwords or other sensitive information.

“A phishing simulation helps people understand the role that they play in managing security — that it’s not up to their IT support or the help desk or whoever that they can sort of blindly walk along,” said Helen Patton, Ohio State’s chief information security officer. “A lot of what makes an organization secure is what happens between an individual and their keyboard or their phone.”

Patton talks about it like a digital vaccination, helping protect individuals and the broader campus community against cyberattacks that could cost far more than the phishing simulations.

Just last month, U.S. prosecutors accused a group of Iranians of hacking the computer systems of about 320 universities in the U.S. and abroad to steal billions of dollars’ worth of science and engineering research that was then used by the government or sold for profit. Prosecutors said spear-phishing emails were used to target over 100,000 professors, but they didn’t publicly identify those individuals or their schools.

ADVERTISEMENT

Ohio State has used phishing simulations for employees since 2016. Officials won’t disclose exact results for security reasons but say responses have improved since the early rounds when, for example, a message about a second-floor printer was clicked by people in facilities that didn’t even have a second floor.

In a hurried, tech-reliant culture in which so many people exchange so much information at their fingertips on smartphones and other devices, Patton said, the battle is getting people to slow down.

The practical, experiential training of fake phishing has proved more effective compared than slideshows, webinars or other common types of training that can get stale, said Joanna Grama, who directs the cybersecurity program at the higher education technology association EDUCAUSE.

The risk, of course, is that folks will feel tricked, so it’s important that the training be educational, not punitive, Grama said.

At Alabama-Birmingham, one faculty member decried the phishing simulation as a waste of time, but most responses were positive, said Curt Carver, the university’s vice president for information technology, who recalls first hearing about the concept of self-phishing over a decade ago.

Some people report the messages as suspicious, and others send replies like “Ha, you got me!” or “Didn’t get me this time!” A few, he said, expressed interest in making it more of a game, wanting to gauge how well they detect phishing attacks compared with others.

“They’ve realized ... they can be a hero, they can be a person that helps protect everybody else,” Carver said.

___

Find Kantele Franko on Twitter at http://www.twitter.com/kantele10 and her work at http://bit.ly/2qEaebN.