Humboldt-Universität zu Berlin - Computer and Media Service

Humboldt-Universität zu Berlin | Computer and Media Service | Services | Communication services | email | Spam, Scam, Phishing, and other unwanted Emails

Spam, Scam, Phishing, and other unwanted Emails

Unwanted emails are often generally referred to as spam, but they can be categorized into different types based on their intent.

Spam typically refers to mostly harmless but annoying advertising content of various forms.

Scam emails aim to deceive, for example, by demanding ransom for allegedly stolen data.

Phishing attempts to trick recipients into revealing their login credentials or other personal information. Captured login credentials can then be used to send malicious emails or launch other attacks with the newly acquired privileges. A classic example is emails requesting account confirmation to prevent it from being blocked.

A clear distinction between types of malicious emails is not always possible. Sometimes, identity theft is used to disguise scam or phishing attempts, making them more believable to recipients. Phishing emails are often sent in the name of supposed IT support.

Additionally, all types of unwanted emails can be used to spread viruses and other malware.

The motivation behind unwanted emails generally depends on their type but is not always apparent. In the case of phishing, universities and other institutions offer a lucrative target because captured accounts can exploit the existing and usually good reputation and internet connectivity.

Possibilities to detect unwanted emails

Spear phishing and social engineerung

Countermeasures by CMS

Countermeasures for users

Procedure in case of disclosure of access data

Consequences of successful phishing attack

Exceptions to filter rules

Further reading

Identifying Unwanted Emails

Malicious emails can be identified based on various indicators:

  • Sender, recipient, reply address (Reply-To)
  • Subject
  • Content
  • Links
  • Language and phrasing
  • Expectations
  • Cryptographic signatures

There are numerous scenarios where a legitimate email may meet one or more of the following criteria, so they should not be considered as standalone indicators. Instead, it's important to piece together the "right" picture using various indicators to assess the legitimacy of an email.

If in doubt, you can always contact the CMS user support regarding emails received at your HU account. Attach the suspicious email or forward it as an attachment.

Sender, Recipient, Reply-To 🖉
Subject 🖉
Content 🖉
Links to Unknown Websites 🖉
Language/Expression 🖉
Expectation: Do you expect such an email? 🖉
Cryptographic Signatures 🖉
Spear Phishing and Social Engineering

Most phishing attacks are general and target an undefined group of recipients. Spear phishing is specifically tailored to certain recipients and uses more specific information to enhance the appearance of legitimacy.

Social engineering refers to manipulative behavior aimed at obtaining confidential information or persuading a person to perform certain actions. This can also include disclosing confidential information or granting permissions that attackers would not otherwise have.

Both are not always immediately recognizable and may only become apparent once an attacker has achieved their goal. Spear phishing and social engineering are therefore difficult to detect or prevent through technical measures.

Countermeasures by CMS

As part of the email operations at HU, various measures against unwanted emails are implemented, including:

  • Conventional blocklists
  • Reputation databases
  • Virus filters
  • Spam detection and classification
  • Filtering for known phishing campaigns

Depending on the classification, incoming emails are:

  • Rejected before acceptance on the server
  • Discarded and a warning about detected malware sent to the target address
  • Delivered as an attachment to a phishing warning
  • Marked as spam and delivered

Emails classified as harmless are also delivered.

Blocklists and Reputation Databases 🖉
Virus Filter 🖉
Spam Filter 🖉
Phishing Filter 🖉
Countermeasures for Users

As a user, you can also take active steps to protect yourself and all other members of HU from unwanted emails.

The first and simplest step is to activate the automatic spam filter. This ensures that emails already marked as spam are automatically delivered to the AutoCleanSpam folder. However, you should still regularly check this folder to avoid overlooking any misclassified emails.

The most important measure for you as a user is to carefully read emails based on the previously mentioned criteria. If you are ever unsure, you can always contact the CMS user support.

The same applies if you receive spam or phishing emails. Please forward the relevant messages to us, and we will try to improve our filtering measures. However, as with detection, there is no guarantee that similar emails will not occur in the future, as the senders of unwanted emails continuously develop their campaigns.

If you are asked via email to disclose your account and password, and possibly other personal data, then ignore this request!

If you are unsure, contact our user support. Please also encourage people in your environment to adopt this approach!

The only reason for a personal email of similar content from CMS to you is the reminder about the expiration of your password. Since your password is always valid for one year, you can always estimate the expected date based on your last password change. You will receive this reminder four weeks before the expiration date and additionally one week before the deadline. We do not ask you to send us your password in this email. Furthermore, these emails do not contain a direct link to the password change form.

The validity of the password can also be viewed via the account info.

If you do not comply with this genuine request, you will not lose anything: your data will not be deleted, and emails will continue to be delivered. You can still contact us (user support) and have the account reactivated.

Procedure in Case of Disclosure of Access Data

Falling for phishing or other harmful emails can have various reasons. Especially in stressful situations, such emails can be difficult to recognize.

If you find yourself in this situation, always remember: everyone makes mistakes, and you do not need to hide it. If you realize that you have entered your HU account access data on a phishing website or shared it in any other way, please change your password immediately! Additionally, feel free to contact us (user support), and we will assist you with further steps and provide tips on handling future phishing attempts.

Consequences of Successful Phishing Attacks

A single compromised account with a password is sufficient to launch a new phishing or spam wave within minutes. The result is a disruption of email traffic for the entire university. In the worst case, this can last for many days because the reputation of our servers, through which the emails are sent, significantly deteriorates. Legitimate and previously problem-free emails are then no longer deliverable, making communication with other institutions considerably more difficult.

As a side effect, phishers with a compromised account and password have access to the entire mailbox, all data associated with the account, and access to portals such as Agnes or Moodle, and possibly even non-university, privately used portals. In most cases, this also means unauthorized disclosure of personal information and thus a data protection violation.

Exceptions to Filter Rules

In principle, it is possible to define exceptions to filter rules, but we try to keep their scope as small as possible.

A defined filter rule always serves to protect all members of HU from unwanted emails. Exceptions to this usually only apply to one or a few senders and recipients and are therefore disproportionate in comparison. In most cases, only individual emails or a specific thread are affected by misclassified spam or phishing emails, not "the sender."

Criteria for exceptions include:

Many recipients are affected
The erroneous classification can be reproduced
There is a sensible pattern for exceptions

Since email senders can be easily forged, we generally do not grant releases for individual addresses.

Further Links
  • Phishing tips from the HU Information Security Team
  • BSI website on spam, phishing, etc.
  • Internet standard for formatting URLs/URIs (RFC 3986)
  • Internet standard for DNS terminology (RFC 8499)
  • Wikipedia on spam, scam, phishing, and social engineering