The sudden spike in triple clicks from .edu addresses during a recent email campaign is primarily attributed to increased security measures implemented by educational institutions and email providers. These measures include automated systems scanning emails for malicious content by clicking on links, often multiple times, before the email reaches the recipient. Factors contributing to this include updated security filters, the high vulnerability of .edu domains to cyberattacks, and the need to protect unmanaged user machines on their networks. Services like Proofpoint's URL Defense, Cisco's AMP, and Microsoft's Safe Links rewrite URLs and scan destination websites, triggering click events. The widespread adoption of these security practices aims to protect users from phishing and malware, but results in skewed click data and website traffic.
11 marketer opinions
A recent email campaign experienced an unexpected surge of multiple clicks originating from .edu addresses. This phenomenon is primarily attributed to automated security measures implemented by email providers and organizations, particularly academic institutions, to safeguard against phishing and malware. These systems often scan emails for malicious content by automatically clicking on links, resulting in clicks being registered before the recipient interacts with the email. The heightened security protocols of .edu domains, driven by their susceptibility to cyberattacks, contribute to this increased link checking activity. The spike can also be caused by security systems being updated.
Marketer view
Email marketer from Reddit explains that .edu addresses often have stricter security protocols because universities are prime targets for phishing and malware attacks. Automated link checking is a common security measure.
19 Nov 2024 - Reddit
Marketer view
Email marketer from Email Geeks explains that some domains check the email before entering the recipient mailbox and may follow links in the email, which, with tracking, can be registered as a click.
3 Feb 2025 - Email Geeks
5 expert opinions
A sudden spike in clicks, specifically triple clicks from .edu addresses in an email campaign, is likely due to updated or new security measures implemented by these educational institutions. Because the machines used on the networks are often unmanaged they need to secure their inbound mail servers as best as they can, and this often involves automated link checking. This link scanning is a proactive effort to defend against malware and phishing attacks and the spikes occur when the filtering service updates, or a new filter service is put in place, which then checks links. This security behavior is not exclusive to .edu domains as .gov and businesses implement similar.
Expert view
Expert from Spam Resource responds that a sudden change in click behavior, such as a spike in clicks from .edu addresses, could be attributed to updated security filters on the receiving end, especially if they've implemented new link checking mechanisms.
23 Dec 2023 - Spam Resource
Expert view
Expert from Email Geeks explains that academia doesn’t have control over the user machines like corporate sites do, therefore .edu network admins are going to do _everything_ they possibly can to catch malware at the places they do control, like the inbound mailserver.
11 Mar 2024 - Email Geeks
3 technical articles
A recent email campaign experiencing an unexpected spike of triple clicks from .edu addresses is likely due to security services like Proofpoint's URL Defense, Cisco's AMP, and Microsoft's Safe Links. These services scan URLs in emails for malicious content. By rewriting the URLs and scanning the destination website, a click event can be generated even before the intended recipient reaches the site.
Technical article
Documentation from Microsoft explains that Safe Links is a feature in Microsoft Defender for Office 365 that rewrites URLs to point to Microsoft's servers, which scan the link before redirecting the user. The scan can generate a click event.
4 Aug 2022 - Microsoft
Technical article
Documentation from Cisco details that Advanced Malware Protection (AMP) for Email scans attachments and URLs in emails. It may visit links to analyze the content for threats, which can register as a click.
16 Nov 2022 - Cisco
Do spam traps ever open or click on emails?
How can I detect and segment bot clicks in email campaigns?
How can I identify and handle suspicious bot clicks in email marketing campaigns?
How can I identify bot user agents in my email click data?
How can I minimize bot clicks in email marketing and what are the best methods for identifying and filtering them?
How can I prevent bot clicks from hurting my email reputation?