"Phishing" refers to the fraudulent attempt to obtain sensitive data (personal and business) by posing as a trustworthy contact. Find out here how you can protect yourself against this threat.
Fake emails, websites or text messages (via SMS or WhatsApp) are used as tools for this digital data theft. Victims are often subject to identity theft, or dangerous malware may be installed on their devices via attachments.
Even if you're not an IT expert, you might still be on the radar of cybercriminals.
Sensitive Data
If you have access to confidential information, such as student records, financial data, or confidential research data, you become an attractive target for attackers.
Your Credentials Are the Key
Your username and password could give cybercriminals access to critical university systems if they manage to steal these details.
Identity Theft
Attackers could steal your identity and impersonate you to conduct illegal activities or launch further attacks in your name.
Sensitive Emails
Your emails may contain confidential information that is highly valuable to attackers.
The Entry Point
Your computer or smartphone could be used by attackers as a gateway to infiltrate the entire university network.
Remember, security is a shared responsibility, regardless of your IT knowledge. Your vigilance is crucial in protecting yourself and the university from threats. Stay alert and learn to recognize phishing attacks to keep both yourself and the university safe.
Phishing emails can be identified through certain key features, some of which you can see here. "Good" phishing emails combine several of these features - for example, they might convey urgency or try to arouse your greed. Some earlier signs of phishing (like spelling and grammar errors) are now less common thanks to the increased use of AI.
A common tactic in phishing emails is to pressure the recipient into acting immediately. For example, the email might say something like "We urgently need to transfer funds to company X today."
Examples:
- Your PayPal account has been locked.
- A DHL package could not be delivered.
- You have received an official notification.
- Data verification ("Your IT administration needs to check your access data. Please enter it here: ...")
- Software update prompt ("Your Outlook is outdated. Click here ...")
Phishing emails often reference current events, like:
- Current COVID-19 measures
- A damaged car in the parking lot
- Requests for assistance by police officers
- Storm damage on campus
The urgency of the supposed event might push you to respond immediately and click on a fake link, or divulge sensitive information (like your license plate number).
Phishing emails often advise you to check the data in email attachments.
This is particularly dangerous, because these attachments can allow malware to be installed on your device. The malware can then target your data, your computer - and even the whole university network.
Examples:
- List of vacation days in Excel
- Invoices
- Vacation photos (e.g., in a ZIP file)
These file formats are particularly dangerous when sent as attachments:
- .docx and .xlsx (Word and Excel files)
- .xlsm (Excel files with executable content)
- .exe
- .zip and .rar
However, other file types can also be dangerous. Always ask yourself: Am I expecting an email with this attachment from this sender?
Examine the URL closely:
Hover over the link (without clicking) to see the actual URL in the bottom corner of your browser or email client. Look for spelling mistakes or unusual characters that could indicate a fake, phishing-related website.
Be cautious of shortened links:
Shortened URLs (like bit.ly, t1p.de, or goo.gl) obscure the real destination and are frequently used by phishers.
You might also consider using this pro tip.
You are encouraged to report suspicious emails to postmaster-PleaseRemoveIncludingDashes-@uni-flensburg.de. Your reports will be used for analysis and may help us adjust our security systems so that they can detect and combat potential threats early on.
Please change your password immediately. You can find instructions for changing your password on the Access data page. Report the incident promptly to ZIMT Service so that protective measures can be taken as soon as possible.
- Short videos on various IT security topics (in German) | Bundesamt für Sicherheit in der Informationstechnik (BSI) [German Federal Office for Information Security]
- Phishing quiz (in German) | Karlsruher Institut für Technologie (KIT), Secuso
- Key features of phishing emails (in German) | Verbraucherzentrale [Consumer Advice Center]