Why did a recent email campaign see an out-of-the-blue spike of triple clicks from .edu addresses?
Summary
What email marketers say11Marketer opinions
Email marketer from Reddit explains that .edu addresses often have stricter security protocols because universities are prime targets for phishing and malware attacks. Automated link checking is a common security measure.
Email marketer from Email Geeks explains that some domains check the email before entering the recipient mailbox and may follow links in the email, which, with tracking, can be registered as a click.
Email marketer from Litmus explains that bot clicks often come from security software scanning emails, especially from corporate or academic domains. These systems might be updated without warning, causing a sudden spike in clicks.
Email marketer from StackOverflow states that some organizations use automated tools to verify links in emails, which may generate clicks. The automated tools verify if the link has malicious content.
Email marketer from SecurityForums comments that the automated link checking is a security measure to prevent malware, because .edu domains usually have a lot of students that are easily tricked.
Email marketer from EmailVendorSelection explains that advanced spam filters analyze links in emails by visiting them, which generates clicks. The filters might be more aggressive for .edu domains due to their vulnerability.
Email marketer from Email Geeks explains If each link is being clicked, it's most likely an antispam/antimalware system probing the mail and suggests setting rules to not register a click occurring before the opening of an email.
Email marketer from Mailjet explains that many email providers use security software that automatically clicks on links within emails to check for malicious content. This can result in multiple clicks from the same IP address.
Email marketer from Quora notes that automated systems might 'test' links in emails, particularly in academic institutions, to safeguard against malicious content. The specific number of clicks might be related to how thorough the test is.
Email marketer from SendGrid shares that email security systems can scan emails for phishing attempts and malware by automatically clicking all the links. This is especially common with organizations that have strict security protocols.
Email marketer from StackExchange shares that security software might be configured to click links multiple times (e.g., three times) to ensure the destination is safe. This can happen especially when security settings are updated or tightened.
What the experts say5Expert opinions
Expert from Spam Resource responds that a sudden change in click behavior, such as a spike in clicks from .edu addresses, could be attributed to updated security filters on the receiving end, especially if they've implemented new link checking mechanisms.
Expert from Email Geeks explains that academia doesn’t have control over the user machines like corporate sites do, therefore .edu network admins are going to do _everything_ they possibly can to catch malware at the places they do control, like the inbound mailserver.
Expert from Word to the Wise shares that many organizations, including educational institutions, implement security measures that involve scanning links within emails. This helps protect users from phishing or malicious content, often leading to a click being recorded before the recipient sees the email.
Expert from Email Geeks guesses that the spike happened because the .edu domains are using the same filter box / filter service, and that filter got updated and now checks links.
Expert from Email Geeks adds that the “everything gets clicked (and likely as a security measure)” scenario is real, especially for .edu, .gov and many businesses.
What the documentation says3Technical articles
Documentation from Microsoft explains that Safe Links is a feature in Microsoft Defender for Office 365 that rewrites URLs to point to Microsoft's servers, which scan the link before redirecting the user. The scan can generate a click event.
Documentation from Cisco details that Advanced Malware Protection (AMP) for Email scans attachments and URLs in emails. It may visit links to analyze the content for threats, which can register as a click.
Documentation from Proofpoint explains that their URL Defense service rewrites URLs in emails and scans the destination website when a user clicks the link. This can generate a click event before the user actually reaches the site.