Skip to content

Phishing Attack on K-12 Schools: How it Worked and How to Stay Safe

Picture this: you open an email that looks like it’s from your school’s IT team, urging you to log in to check an urgent update. The page seems familiar, branded with a trusted name like Microsoft or GoDaddy. But it’s a trap–a phishing scam designed to steal your credentials. In early April, schools across the U.S. fell victim to such a sophisticated attack, targeting educators and staff with fake login pages. Here’s how this scam worked, why it’s a growing threat, and what you can do to protect your school community.

The Attack: Fake Logins Targeting Schools

These phishing emails led users to malicious websites hosted on a suspicious domain, heb6[.]ewetanign[.]ru. Each school received a slightly different version of the scam, tailored to blend in with their usual systems, but all had one goal: harvesting usernames and passwords. Schools are prime targets due to their large user bases, sensitive student data, and often stretched IT resources

How the Scam Fooled Users

The phishing pages were eerily convincing, using tricks to look legitimate.

Realistic Login Pages

Each school’s phishing site featured a fake login form branded with GoDaddy’s logo, mimicking Microsoft 3565’s interface. Here’s is an example seen while reviewing an attack on a school.

Figure1_GoDaddy code block

Sneaky URLs

The phishing links used the domain heb6[.]ewetanign[.]ru with different paths and parameters for each school:

URL 1 (School 1)

· Protocol: https://

· Subdomain: heb6

· Domain Name: ewetanign.ru

· Path: /wxhvfxckpcddvnwafemgoaqycfgyjpfQR3NHBBOYCJTSFBSVCBRMKZRP2KY

· Query: ?

· Parameters: UDPBMIXTBBYCUDANXUR

URL 2 (School 2)

· Protocol: https://

· Subdomain: heb6

· Domain Name: ewetanign.ru

· Path: /azzhlcxkbxhgcyztdindndfrihnrb8lpb4gcj3a777xuiu4rcwd1gsn

· Query: ?

· Parameters: KTXNXZITZQGVFPVE

URL 3 (School 3)

· Protocol: https://

· Subdomain: heb6

· Domain Name: ewetanign.ru

· Path: /nstekfenmnywhxavuiyvbrwnalrwuxopvwcuzBAQRT35SS561IJ73

· Query: ?

· Parameters: MZJQOGAMPSIVXEYCYWXKLKOPQB

URL 4 (School 4)

· Protocol: https://

· Subdomain: heb6

· Domain Name: ewetanign.ru

· Path: /eikwfgysxpnmiklvmmvpak2J39KBQ9UC3FRUWAGBIH6

· Query: ?

· Parameters: YOGNWPQAZJAYWQY

These cryptic URLs hid their malicious intent, making it tough for users to spot the scam. In the fourth attack, these URLs dynamically loaded stylesheets to perfect the fake login’s appearance.

Anti-Detection Tricks

The attackers used clever defenses to hide their tracks:

Blocking Developer Tools: Scripts stopped users from inspecting the page’s code, redirecting curious techies to legitimate sites like Amazon or eBay. The code block below is an example from a school that was targeted.

Figure2_Blocking Developer Tools

Clipboard Hijacking: Copying text from the page replaced it with gibberish (e.g., PSZjPRbktp in a school that was targeted), preventing users from sharing evidence.

Encrypted Data Theft: The sites used a tool called CryptoJS to encrypt stolen credentials before sending them to servers like oleyzq[.]ru and yvpnwx[.]ru.

School-Specific Twists

While the scams shared a common playbook, each had unique tweaks:

One School’s Monitoring: This landing page HTML included a script scanning for words like “guns” or “exploit,” likely to flag sensitive inputs in a school setting.

Figure3_Monitoring

Another School’s Dynamic Design: Unlike the others, one school’s page used heb6[.]ewetanign[.]ru for stylesheets, loading them dynamically to stay flexible and harder to block.

Here’s how the pages compared:

Feature School 1 School 2 School 3 School 4
Blocks Developer Tools
Evades Webdriver/Burp
Debugger Redirect

(Amazon)

(eBay)

(HomeDepot)

(HomeDepot)

Clipboard Hijack

(PSZjPRbktp)

(CLgixPq0YD)

(eZDUELzxN0)

(nGktzcMgoK)

Uses GDSherpa Font
Similar HTML Structure
Background Image Source Local Path Local Path Microsoft CDN Microsoft CDN

Suspicious scripts (randexp/crypto-js)

Hidden Quote Comments
Uses startnew Class
Content Filtering Script

Why This Scam Was So Dangerous

The attackers used a shared template, tweaked for each school, to:

Look Legitimate: Identical meta tags (noindex, nofollow) hid the pages from search engines, while familiar designs built trust.

Figure4_Meta Tags code block

Stay Hidden: Anti-debugging scripts and multiple domains (oleyzq[.]ru, yvpnwx[.]ru, heb6[.]ewetanign[.]ru) made takedowns tough.

Steal Data Fast: Encrypted credentials were sent to remote servers, risking exposure of student and staff data.

Protect Your School from Phishing

This attack shows how sneaky phishing can be, but you can fight back:

Check URLs Carefully: Look for odd domains like ewetanign[.]ru. Stick to official sites (e.g., godaddy[.]com, Microsoft[.]com).

Enable Two-Factor Authentication (2FA): Adds a second layer of security, even if passwords are stolen.

Train Staff and Students: Teach everyone to spot phishing emails (e.g., urgent requests, weird links).

Report Suspicious Emails: Alert your IT team immediately to stop scams before they spread.

Use Antivirus Software: Tools can flag malicious sites, through vigilance is still key.