ED Grant Portal Target of Phishing Campaign

Threat researchers at BforeAI have identified a phishing campaign spoofing the U.S. Department of Education's G5 grant management portal. Multiple lookalike domains have been observed hosting phishing kits or cloned login portals in an attempt to harvest login credentials from legitimate users, the cybersecurity company explained.

"These domains attempt to clone or imitate the official G5.gov interface and may be targeting education professionals, grant administrators, or vendors tied to the U.S. Department of Education," BforeAI reported, adding, "This activity is particularly alarming given the recent Trump Administration announcement of 1,400 layoffs at the Department of Education, which may create confusion and an opportunity for social engineering."

BforeAI noted that credentials stolen through this campaign could allow attackers to access sensitive grant award data, change payment instructions, or impersonate recipients for fraud, among other potential impacts. Users are advised to avoid clicking on links from unknown sources, always verify URLs, and report suspicious e-mails or domains to their organization's cybersecurity team or to [email protected].

For more information, go to the BforeAI site.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • blue AI cloud connected to circuit lines, a server stack, and a shield with a padlock icon

    Report: AI Security Controls Lag Behind Adoption of AI Cloud Services

    According to a recent report from cybersecurity firm Wiz, nearly nine out of 10 organizations are already using AI services in the cloud — but fewer than one in seven have implemented AI-specific security controls.

  • abstract pattern of cybersecurity, ai and cloud imagery

    Report Identifies Malicious Use of AI in Cloud-Based Cyber Threats

    A recent report from OpenAI identifies the misuse of artificial intelligence in cybercrime, social engineering, and influence operations, particularly those targeting or operating through cloud infrastructure. In "Disrupting Malicious Uses of AI: June 2025," the company outlines how threat actors are weaponizing large language models for malicious ends — and how OpenAI is pushing back.

  • tutors helping young students with laptops against a vibrant abstract background

    K12 Tutoring Earns ESSA Level II Validation

    Online tutoring service K12 Tutoring recently announced that it has received Level II validation underneath the Every Student Succeeds Act (ESSA). The independently validated study provides evidence of K12 Tutoring's role in creating positive student outcomes through effective academic intervention and research-based solutions.

  • various technology icons including a cloud, AI chip, and padlock shield above a laptop displaying charts and cloud data

    Data Security Report Identifies Cloud Governance Gaps, AI Impact

    A recent Varonis data security report notes that excessive permissions and AI-driven risks are leaving cloud environments dangerously exposed.