老牛影视

Skip to main content

Phishing Attack Underscores Value of Digital Security

Heading into Cybersecurity Awareness Month in October, an encounter with hackers offers reminder of threats

Hook stealing info
Image courtesy of Big Stock.

Late on a Thursday night last month, Duke IT Security Office Senior Manager Nick Tripp was still at work and on the phone. On the other end of the call was a stranger with an eastern European accent, typing in the information Tripp gave him.

Duke IT Security Office Senior Manager Nick Tripp.鈥淗e was all business, straight to the point, kind of like an annoyed tech support person,鈥 Tripp said. 鈥淎nd as soon as he got what he wanted from me, he hung up. Not as much as a 鈥楾hank you.鈥欌

The person Tripp was speaking to was part of an active phishing attack that, at that moment, had seized control of several Duke email accounts and posed a serious threat to Duke鈥檚 IT security. Tripp was playing along with the phish, providing fake information so he could learn more about the hackers and figure out what they were after.

鈥淚t was annoying to have to speak with this person who is keeping you at work at 11 o鈥檆lock on a Thursday night,鈥 Tripp said. 鈥淵ou just want to say 鈥楬ey, could you just stop?鈥欌

October is  month, offering users at Duke a chance to brush up on safe online behaviors and learn how they play a key role safeguarding digital assets. 

Last month鈥檚 phishing attack, which saw hackers briefly make inroads through Duke鈥檚 email system, provided a real-life example of the threats that exist online, and how individual community members who prioritize cybersecurity can keep hackers from doing real damage.

鈥淚t was not a fun few days for anybody, but we could clearly see that people were out there telling us, and telling their entire departments, that something was happening,鈥 said Shelly Clark Epps, Senior Director of Cyber Risk for the Duke Health Security Office. 鈥淭hat speaks to the way that we have tried to activate the entire Duke community to think about security. It could have been much worse than it was.鈥

Senior Director of Cyber Risk for the Duke Health Security Office Shelly Clark Epps.The attack popped onto the radar of Duke鈥檚 IT security teams around 11:30 a.m. on Thursday, September 13 as hundreds of Duke email users began forwarding suspicious emails to the security@duke.edu email address and hitting the  on Duke鈥檚 Outlook email tool.

The volume of the reports, and the fact that thousands of the suspicious emails were coming from the same valid Duke email account, which hackers had gained control of, made the situation especially concerning.

鈥淎s soon as we realized what was happening, we locked the compromised account to cut off the attacker鈥檚 ability to send anything more,鈥 Epps said. 鈥淎nd then, the attacker realized it and we saw new accounts, which they had compromised, start sending out new rounds of emails.鈥

Over the course of Thursday, a response team featuring IT security staff and service desk members from the  and Duke Health Technology Solutions, discovered and locked six Duke email accounts which hackers had compromised. Another hacked email began sending phishing attempts a few days later, and was quickly locked.

A phishing website. The first rounds of suspicious emails early Thursday claimed to be from Duke, alerting the recipient that their email account would be deleted unless they visited a website and entered their username and password. If recipients followed through with the request, they鈥檇 eventually be contacted by the hackers, who would ask them to read the multi-factor authentication codes sent to users鈥 phones when the hackers tried to log into the users鈥 email.

Later rounds of suspicious emails used offers of attractive jobs to try to obtain valuable data, such as Social Security numbers and banking information.

鈥淲e鈥檙e not going to catch these people and we鈥檙e not going to be able to stop these kind of attacks, but what we can do is slow them down and limit the impact they can have,鈥 Tripp said.

While Duke鈥檚 IT security teams are still studying the attack and exploring ways to strengthen defenses against future ones, the saga underscores the importance of a few proven security practices.

  • If you receive an email that looks suspicious, use the 鈥淩eport a Phish Button鈥 to alert Duke鈥檚 IT security experts or forward it to security@duke.edu. On first day of the attack, hundreds of users did this, helping Duke鈥檚 IT security teams respond quickly. 鈥淚nitially, we were really excited about the overwhelming response, we were very excited to see that our activated sensor network was working,鈥 Epps said.
  • Do not share your passwords or your multifactor authentication codes with anyone. 鈥淒uke personnel will never ask you for your passwords or your multi-factor codes,鈥 Tripp said. 鈥淚f someone is asking for either of those things from you on the phone or in an email, they鈥檙e not from Duke.鈥
  • Multifactor authentication remains an effective tool for securing accounts. And Duke OIT offers tools to make using it easier.  is a service which allows you to use multifactor authentication easily on your devices, such as smart phones, even when not connected to the Internet. Meanwhile, with , Duke community members can use features on their personal devices, such as their PIN, face ID or fingerprint, to easily log into Duke sites.

Send story ideas, shout-outs and photographs through  or write working@duke.edu.