Best Practices for Phishing Prevention at UT Health San Antonio
There has recently been an increase in phishing messages targeted at the University and its faculty and staff with the sole purpose of stealing as much information as possible from users and the university.
Always question anything that asks for your username and password, or any other sensitive information. No one at the university will legitimately ask for that information. If someone does, they're trying to steal your data, misuse your resources, or both.
A phish is fraudulent email pretending to be from a genuine organization you may be familiar with, trying to convince you to give up sensitive information. It may appear to come from your bank, credit card agency, a loan institution, or even the University. The most common phishing seen at the University appears to come from our own email team or Service Desk, but is really someone intent on stealing our information.
What do I watch for?
If the message contains one or more of the following items, it's probably a phish.
- Look at the “From” line. If the address claims to be from the University or is generic, but doesn't end in uthscsa.edu, it is a phishing attempt. All email regarding University IT, email and security matters will come from a University email address.
- Look at the grammar and spelling in the body of the message. Most phishing attempts include a message that does not flow very well.
- If there are links in the message, don't click on them yet. Most phishing messages direct you to click on a link in the message to "verify your identity," but, instead send you to another website that tries to collect your information and even remotely compromise your computer. Before you click on any link, move your mouse pointer over the link, but do not click. Floating the mouse pointer over a link will show you the true destination of the link, regardless if the link says "Click here" or anything else.
- Does the message include some form of threat? Phishing messages try to generate a sense of urgency by telling you something bad will happen if you don't comply, the most common being that your account will be blocked or canceled.
Official signature blocks
All messages coming from the Information Management and Services (IMS) technology offices will have signature blocks like the ones below.
Official signature blocks will have the following minimum elements:
- An official UT Health San Antonio logo on the left
- The sender's name
- A contact telephone number; use this number to validate the message
The examples above has been watermarked to keep them from being copied and used in a phish.
Many phishing messages claim to come from the "IT Help Desk". The official name of the department is "IMS Service Desk", as shown in Example 1. Example 2 shows a signature block sent on behalf of the Information Security Office.
E-mail systems set up to receive text-only messages (no images) will show the text of the signature blocks only, without the logos. See Example 3 and Example 4.
What do I do if I get a phish?
- Don't click on anything inside the message. Many times, the entire body of the message is a link to a website outside the university, usually a compromised site that will try to infect your computer. This also applies to any attachments, as they can be infected, as well.
- Forward a copy of the phish to the phishing response team as an attachment. Sending the original message as an attachment preserves the background information from the message, showing where the email really originated. This also allows the email team to block the message from coming in again. Additionally, it gives us the ability to find others who received the message and may have clicked on any viral links.
Send the phish as an attachment by following these steps:
Outlook for Windows*, Office 365 or Web App
*Outlook for Windows (starting July 14, 2017)
Outlook for Mac 2016
What happens if I click on a link in the phish?
Clicking on a link in a phish sends you to a web site outside the control of the University. Many phishing sites are well-researched and well-designed to look like the real thing, and some just put fields for the data they want to steal. In either case, many of those sites also have applications running in the background, silently probing your computer for a way in. Your computer could be infected and you wouldn't necessarily know it; this is referred to as a "drive-by infection."
- If you click on a link in a phish, immediately back out of the page and close your browser.
- Call the Service Desk, 210-567-7777 and let them know you clicked on the link in the phish. They will make arrangements with your TSR or technical support to have your computer scanned and, if necessary, cleaned.
- After you call the Service Desk, save your work, backup your data, and log out of your computer. If you did get a drive-by infection, these actions will minimize the effect of the malware on your data; they will also reduce the probability of your computer infecting others on the network. Actions may also be taken to remotely remove your computer from the network.
- Once your computer has been scanned and cleaned by technical personnel, it is highly recommended you change any passwords of any accounts accessed from that computer. If your computer was remotely removed from the network, access will be restored at this time.
I already gave up my username and password. What now?
If someone has your University login credentials, that is, your username and password, anything you can do on your computer or the network, they can do. This puts the entire university at risk.
- If you haven't already been contacted by Information Security, notify the Service Desk by calling 210-567-7777. Send them a copy of the phish using the steps in "What do I do if I get a phish?" above.
- Your email account will be disabled to prevent it from being used for spam or for sending phishes to others.
- Your computer will be remotely removed from the network, in case it was compromised by malware from a drive-by infection; this protects the rest of the computers on the University's network.
- Your TSR or technical support will be notified and will be sent to scan your computer for malware and to clean or re-image it, if necessary.
- Once your computer has been verified as clean, arrangements will be made to re-enable your computer's connection to the network.
- After access has been restored, you will be required to change your password immediately, as the phisher has your old one. This cuts off the phisher's access to our network.
- Finally, your email access will be restored.
A note from Information Security: It's obvious from above that the best way to deal with a phish is to recognize it when you see it and to notify the appropriate personnel. Clicking in the phishing message or accidentally giving away your login credentials involves a great deal more work for everyone. It is a guaranteed loss of productivity while your computer is off the network and you can't get any work done. Also, once your computer is compromised, data loss or data theft are possible no matter how quickly technical support personnel gets your computer cleaned up.