
Informatics students know how to work hard and earn high grades. One student, Marie O鈥機onnell, found another way to ensure that she earned an A: by hacking her professor.
Andrew Reifers, an associate teaching professor at the University of Washington Information School, offers students a unique opportunity in his INFO 415: Emerging Topics in Information Assurance and Cybersecurity course.
鈥淚f one of you can hack me successfully, you get an A in my class,鈥 he tells students on the first day.

An Informatics and French double major, O鈥機onnell decided to take Reifers up on the challenge during spring quarter. Reifers has a reputation as an engaging lecturer and a cybersecurity expert, yet even the experts can sometimes be hacked.
It was the first successful hacking attempt in his three years of teaching the course.
Reifers asks students to do outside learning about cybersecurity. With inspiration from lectures and from listening to almost every episode of the 鈥淒arknet Diaries鈥 podcast, O鈥機onnell decided to try her hand at a spear-fishing attack.
Unlike broad phishing attempts, which target many potential victims at once, spear-phishing attempts depend on familiarity. They often use a pretext, a scenario that a hacker can use to engage their target.
In O鈥機onnell鈥檚 case, a casual conversation with Reifers about her involvement in the UW Blockchain Society led to his request for more information 鈥 a perfect pretext.
鈥淲e were having a conversation about blockchain technologies,鈥 said Reifers. 鈥淪he invited me to check out the student organization she鈥檚 part of and then followed up with an email. It seemed very natural. I was fully expecting the email. In no way was there any indication that this was going to be a spear-phishing attempt.鈥
O鈥機onnell鈥檚 previous study of web design was pivotal. She crafted a page that mimicked the University鈥檚 sign-on page. But a masked link directed to a page that harvested Reifers' credentials.
O鈥機onnell had taken advantage of the opportunity that their after-class conversation created, and she was happily surprised to find that it worked. She created a comedic landing page for Reifers to discover.
鈥淪he got me,鈥 Reifers said. 鈥淎s I reflected on her hack, I was impressed with how seamless it was. It transitioned from a social engineering attack to a digital attack in a very professional manner.鈥
The hack was considered an ethical one, without repercussions besides a slight boost in grade. While O鈥機onnell created a proof of concept and wrote out her method, she did not access or save any protected data. Plus, Reifers鈥 two-factor authentication prevented her from seeing his password or files.
After taking Reifers鈥 class, O鈥機onnell sees more connections in what she has learned in both her majors. The combination of skills required in cybersecurity shows the usefulness of interdisciplinary studies.
鈥淚'm really happy that I went out of my comfort zone and took a class that I knew nothing about,鈥 O鈥機onnell said. 鈥淚 would like to get into cybersecurity, and I see this as a foot in the door.鈥
Reifers expressed pride in his student. 鈥淚 hope that she continues investigating cybersecurity as a potential career. I think she鈥檇 be an excellent engineer.鈥