Categorized in: 

Spot and stop phishing scams

Phishing is a type of online scam where cybercriminals pose as trusted individuals or organizations to steal sensitive information, such as passwords, financial data or university login credentials.

Phishing scams often use urgency or fear to trick you into taking quick action without thinking. These scams are becoming more sophisticated, with some messages now free of obvious spelling errors and even crafted using AI tools.

Common signs of phishing

Look for these red flags when reviewing your emails, texts or messages:

  • Suspicious sender: Appears to be from someone you know or a trusted organization but comes from an unexpected or suspicious email address.
  • Generic greeting:Dear user,” “Dear customer,” or no greeting at all.
  • Urgent or threatening language: The sender pressures you to act quickly, like "Your account will be disabled unless you click this link now.”
  • Unexpected links or attachments: Especially files that ask you to “enable content” or links that don’t match the stated destination.
  • Unusual requests: For money, gift cards, passwords or other sensitive info.
  • Poor grammar or spelling mistakes: While still common, phishing emails are becoming increasingly error-free, so this is not the only indicator.
  • Spear phishing: Targeted, personalized phishing scams may refer to or appear to come from your department, coworkers or university affiliates.

Phishing attempts may also use texts, phone calls or collaboration tools like Teams.

Check URLs before you click

  • Hover over links before clicking to see where they really go. On mobile devices, long-press a link to preview its destination.
  • Look carefully at URLs:
    • Secure sites may display a security information icon in your browser's address bar.
    • Watch for look-alike domains, like “micros0ft.com” or “cuboulder.securelogin.net.” Small changes in spelling, extra words or unusual punctuation are red flags.
    • Be cautious even with .edu addresses — cybercriminals can sometimes compromise legitimate accounts.
  • If you receive a message from someone you know but something feels “off,” verify using a different channel, like calling or texting them directly.

 For example, the URL in the image below points to a link that is entirely dissimilar from a normal University of Colorado webpage. Links associated with the university always end with .edu. Also, the “-sup-port-cabanova” wording is not associated with any university service or found in any university URLs. This is clearly a phishing attempt.

A phishing email claims to offer $2,300 in COVID-19 support from the University of Colorado and includes a hyperlink that, when hovered over, reveals a non-.edu web address unrelated to the university.

If you suspect phishing 

1. Don't click any links or open attachments.

2. Use the Report phishing function in Outlook to send it to the security team.

a. In Outlook, click the Message tab, then select Report phishing.

Screenshot of the Outlook toolbar showing various options under the Message tab. The “Report Phishing” button is highlighted in red to indicate where users can click to report a suspected phishing email.

Depending on which version of Outlook you are using, you may need to click Report and select Report phishing from the drop-down menu.

Screenshot of Outlook’s Home tab showing the “Report” button with a shield icon. The dropdown menu is open, and “Report phishing” is highlighted in red to show where to click to report a phishing email.

3. If you already clicked a link or entered your credentials:

a. Immediately report it to CU as a possible incident. Visit the Report an Incident and OIS webpage to learn more and find the correct incident report contact. 

b. Change your password.

c. Contact the UIS Service Desk for urgent support and guidance.

4. Reporting immediately helps stop cybercriminals, protect others and contain the possible incident. CU does not penalize employees or students for reporting suspicious messages in good faith.

Protect yourself long term

Quick reference checklist

Before acting on a suspicious message, ask yourself:

  • Do I know the sender and expect this message?
  • Does the link or attachment make sense?
  • Is there urgency or a request for sensitive info or money?
  • Have I verified through another method (phone call, text message, etc.)?

Add new comment