According to the Education Data Initiative, nearly 43 million Americans are saddled with the burden of student loan debt, with an average individual debt burden of $37,000.
In 2022, President Biden announced a three-part plan to cancel thousands of dollars in student debt for low to middle-income borrowers. The effort has faced numerous obstacles, leaving student borrowers confused and uncertain.
Cyber criminals have proven eager to capitalized on the upheaval.
Across the past two weeks, Harmony Email & Collaboration’s cyber security have not only observed a surge in phishing attacks targeting student loan holders but have identified more than 7,500 emails that weaponize a particularly unique obfuscation method.
How it works
Cyber criminals have crafted these student loan phishing emails in such a way as to prevent their detection by natural language processing detectors.
The emails utilize special text features, including Unicode Left-to-Right Mark (LRM) and Soft Hyphens. Both of these are invisible to viewers but are considered legitimate formatting characters.
Instead of picking up on terms like “student loan”, the language analyzers view the text as a sequence of the following characters:
In addition, the attackers have added some non-obfuscated content, which looks extremely believable.
Example #1 of Phishing Email Text:
“Enrique Resendez, It‘s Robert Lopez with the Student Loan Debt Department. This is regarding your case number 53893. We tried to contact you at your home (4301 Alva FL 33920) and did not hear back. Your StudentLoans have been flagged as possibly eligible for forgiveness under the new 2024 guidelines. Your file will remain open in my system for only one more day. Please give me a call on Monday at…”
Example #2 of Phishing Email Text:
”It‘s Harriott Keefer with the Student Loan Debt Department. This is regarding your case number 55114. We tried to contact you at your home (800 Airport Burl CA 94010) and did not hear back. Your StudentLoans have been flagged as possibly eligible for forgiveness under the new 2024 guidelines. Your file will remain open in my system for only one more day. Please give me a call on Friday at…”
These emails are unsolicited and sound urgent, putting people and businesses at-risk.
Business Risks
These emails, especially those directed to personal inboxes accessed through work laptops, may lead employees to unintentionally disclose sensitive information to cyber criminals. This could result in unauthorized access to company systems, leading to data breaches or compromised business information.
Should an employee attempt to interact with one of these emails on a company device, the employee could also unintentionally expose the company to malware, which could spread throughout a network.
Contending with the aftermath of a cyber incident can result in organization-wide productivity losses, legal issues, and other challenges. Avoid these negative outcomes by applying the insights provided in the following section.
Actionable Insights
The following measures can help protect your business from sneaky student loan related phishing attacks:
1. Employee awareness. Inform employees about student loan email risks and corresponding red flags. For example, any “official” email that requires people to pay up-front or monthly fees for assistance is a scam. Advise employees who may have doubts about student loan-related emails to reach out to their student loan service provider.
2. Email filtering and security tools. Leverage advanced email filtering technologies that can detect and quarantine suspicious emails, including those that use obfuscation techniques like Unicode Left-to-Right Mark (LRM) and Soft Hyphens. Tools like Harmony Email & Collaboration have smart engines that automatically mark common, suspicious email types, including those pertaining to student loan scams. Ensure that updates are regularly made to these tools, as to prevent evolving threats.
3. Multi-factor authentication (MFA). To add an extra layer of security, apply and enforce MFA across business accounts and systems. In addition, encourage employees to apply MFA for personal accounts, especially those related to payments, banking and other forms of financial services.
4. Incident response plan. Create and continuously refine a comprehensive incident response plan. It should include information about how to respond in the event that an employee becomes the victim of a phishing attack. Conduct periodic drills to ensure that all relevant parties are familiar with the responses required.
Keep following our blog for the latest email threat research. For more information about email threat prevention, please reach out to us here.