Skip to Main Content
PCMag editors select and review products independently. If you buy through affiliate links, we may earn commissions, which help support our testing.

COVID-19 Omicron Variant Phishing Emails Target US Universities

'We expect more threat actors will adopt COVID-19 themes given the introduction of the Omicron variant,' cybersecurity firm Proofpoint warns.

By Michael Kan
December 8, 2021
(Al Seib / Los Angeles Times via Getty Images)

Hackers are targeting US universities with phishing emails that pretend to offer testing information about the COVID-19 Omicron variant, according to security researchers. 

On Tuesday, security company Proofpoint warned about the phishing email campaign, which has been trying to steal login credentials from university staff and students. 

The effort dates back to October, and has involved sending thousands of messages to dozens of universities in North America. In the past, the phishing emails mentioned COVID-19 testing for the Delta variant as a way to trick victims into giving up their login credentials. But late last month, the phishing emails pivoted to Omicron as the new strain made headlines. 

For example, one of the messages from the phishing campaign had the subject line: “Attention Required - Information Regarding COVID-19 Omicron Variant - November 29.”

Example of fake login page.

The email then offered a link to a seemingly legit login page from the university. But in reality, the login page was under the hackers’ control, and capable of capturing password information.

Proofpoint now warns: “It is likely this activity will increase in the next two months as colleges and universities provide and require testing for students, faculty, and other workers traveling to and from campus during and after the holiday season.”

Example of fake login page.

Other emails from the campaign include attaching a COVID-19 test result with a link to a fake web page from the university. In some cases, the hackers will also try to steal the two-factor authentication codes for a victim’s account. This involves creating fake login pages intended to spoof multi-factor authentication providers such as Duo.   

Duo spoofing example

The phishing emails can also be tough for victims to spot. Proofpoint points out that sometimes the hackers will use previously hacked university accounts to send out the messages, making the emails seem official. 

“It is likely the threat actors are stealing credentials from universities and using compromised mailboxes to send the same threats to other universities,” the company added. The ultimate goal and the actors behind the phishing campaign remain unknown.

To avoid getting phished, it's best to look at the web address for any login pages sent to you via email. If the URL deviates from the official web address to the domain or contains some oddity, then it's probably a scam. Check out out guide for more tips to stay safe.

Like What You're Reading?

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.


Thanks for signing up!

Your subscription has been confirmed. Keep an eye on your inbox!

Sign up for other newsletters

TRENDING

About Michael Kan

Senior Reporter

I've been with PCMag since October 2017, covering a wide range of topics, including consumer electronics, cybersecurity, social media, networking, and gaming. Prior to working at PCMag, I was a foreign correspondent in Beijing for over five years, covering the tech scene in Asia.

Read Michael's full bio

Read the latest from Michael Kan