Phishing Attacks Targeting Direct Deposit in UCPath

May 19, 2025

To our campus community, 

Heads up! There is another phishing campaign targeting the payroll payments of University of California employees, including faculty, staff, and students. Attackers are attempting to reroute UCPath Direct Deposit payments by stealing login credentials. 

How Attacks Are Delivered

These attacks are sophisticated and use both old and new tactics:

  • Phishing emails. Subject lines can vary, but the goal is to get people to click on a fake UCPath website link to enter their credentials. Then, attackers use that login info to reroute direct deposit payments. View examples of fraudulent messages in the Phish Tank
  • Text messages. Some attacks are delivered as direct text messages to users asking for DUO login codes.
  • Imposter webpages and Google Ads. We have seen examples of extremely authentic-looking fake UCPath pages sent in phishing emails and sponsored in Google Ads.

What You Can Do

Report Suspicious Activity Immediately

If you receive reports of Duo activity or think you have been compromised, send an email to security@berkeley.edu

Our teams are working closely with the UC Office of the President to assess the scope of the attack. We will update the UCPath Phishing Attack webpage with new information as it becomes available.

Thank you for your continued attention to keeping UC data and systems safe!

Tracy Shinn
Associate Vice Chancellor for IT and Chief Information Officer

Allison Henry
Chief Information Security Officer 


This message was sent campus-wide to all student employees, staff, and faculty. If you are a manager who supervises UC Berkeley employees without email access, please circulate this information to all.