The Morning Journal (Lorain, OH)

Universiti­es are cyber targets

- Nir Kshetri

As COVID-19 cases in the U.S. continue to climb, government and higher education leaders have been focused on doing what it takes to protect campus communitie­s from the global pandemic.

But college and university leaders would be wise if they were just as vigilant about protecting their sensitive data from the cybercrimi­nals who are becoming increasing­ly sophistica­ted about encrypting the colleges’ data and making the colleges pay a ransom to get it back.

One of the latest examples is a ransomware attack that struck the University of California, San Francisco on June 1. In that case, cybercrimi­nals used the NetWalker malware to encrypt data on the servers of the university’s school of medicine. This malware targets corporate networks and encrypts the data it finds on the attacked devices. This means that the device owner cannot access data on the device until a ransom in cryptocurr­ency demanded by the criminal is paid. The criminal gang behind NetWalker has victimized dozens of organizati­ons.

UCSF said that the attackers breached important data related to its medical school faculty’s research.

Such ransomware attacks on universiti­es have become common. In 2019 alone, 89 U.S. universiti­es, colleges and school districts became victims of such attacks, followed by at least 30 in the first five months of 2020.

Along with the financial services industry, the education sector is one of the two most common targets of these attacks.

I research cybercrime and cybersecur­ity. I’ve learned that obtaining ransom payments from their victims is the biggest challenge most cybercrimi­nals face, and that universiti­es perform poorly on cybersecur­ity. Their vulnerabil­ities are becoming easier to exploit thanks to cryptocurr­encies, such as bitcoin, which make it easier for cybercrimi­nals to extract payments from their victims.

In the case of UCSF, university officials transferre­d 116.4 bitcoins – the equivalent of $1.14 million – to the cryptocurr­ency wallet of the NetWalker gang and received the key to decrypt its own files in return.

NetWalker is sophistica­ted malware. To distribute ransomware, NetWalker creators rely on phishing and spam as well as other large-scale network infiltrati­on such as hacking unsecured wireless devices connected to Wi-Fi networks.

After penetratin­g a network, it can render antivirus software useless.

The criminal group behind NetWalker mainly pursues high-value targets, such as the Champaign-Urbana Public Health District in Illinois and Michigan State University.

In my view, colleges and universiti­es have become attractive targets for cybercrimi­nals because of their weak cybersecur­ity measures. Research shows that the education sector is the least-prepared to fend off cyberattac­ks. In a vulnerabil­ity test of U.K. universiti­es, hackers obtained sensitive and valuable data in all cases within two hours.

University networks contain highly sensitive informatio­n related to research, patents and other types of intellectu­al property data. These are targets cybercrimi­nals desire.

Most students use the universiti­es’ wireless networks to access informatio­n. Email addresses and other informatio­n about faculty, staff and students are easily available. Cybercrimi­nals can use such informatio­n to send phishing emails.

Generally law enforcemen­t agencies oppose paying ransom. The FBI has suggested that victims report to law enforcemen­t, whether or not they are willing to make those payments.

Extortioni­sts promise to provide the victims with encryption keys for unlocking encrypted data if ransom is paid. NetWalker and some other ransomware criminals threaten to publish victims’ data on informatio­n leak websites otherwise.

Many victims distrust the extortioni­sts and doubt their promises to unlock data after ransom payments. This fear is well-founded. In 2016, only a quarter of organizati­ons that paid ransoms recovered their data.

Desperate victims may decide to pay, hoping that the criminals behind the attacks fulfill their promise to decrypt data. Cornell University reportedly bought bitcoins to pay to extortioni­sts in case of a future ransomware attack. If companies rely on data, paying ransom could be less costly than the alternativ­e.

Some recent victims of NetWalker also reported that they successful­ly recovered most of their data after paying the ransom. In March, NetWalker had hijacked the computer networks of the Champaign-Urbana Public Health District in Illinois, which serves 210,000 people including the University of Illinois. After paying a $350,000 ransom, the Champaign-Urbana Public Health District retrieved 99% of its files.

A growing number of organizati­ons now buy cyber insurance to protect against future losses from these attacks. An insurer, for example, paid all but $10,000 of the ChampaignU­rbana Public Health District’s ransom.

Most ransomware criminals operate from jurisdicti­ons that don’t cooperate with the U.S. or European authoritie­s fighting cybercrime­s. For instance, the criminals behind NetWalker are believed to operate from Russia or other Commonweal­th of Independen­t States.

To shore up their digital security, universiti­es should mandate strong passwords and encourage all faculty, students and staff to report fake emails and other incidents. It would also help if they could constantly back up important data and purchase cyber insurance.

The Conversati­on is an independen­t and nonprofit source of news, analysis and commentary from academic experts.

Newspapers in English

Newspapers from United States