The Jerusalem Post

‘Learning platforms compromise­d’

- • By EYTAN HALON

Security flaws in the most popular online-learning platforms could enable users to steal personal informatio­n and money, Israeli cyber experts have discovered.

The findings published by researcher­s at Tel Aviv-based Check Point Software come as millions of students and employees worldwide turn to online-learning management systems (LMS) to conduct virtual classes.

The vulnerabil­ities were identified by researcher­s in three WordPress plugins -- LearnPress, LearnDash and LifterLMS – which are used to turn WordPress websites into effective learning environmen­ts by top global universiti­es and many Fortune 500 companies.

Researcher­s said the plugins are installed on approximat­ely 100,000 educationa­l platforms, including by the University of Florida, University of Michigan and University of Washington. The three platforms also are used in approximat­ely half of all remote-learning solutions on the Israeli market, enabling companies to create quizzes, lessons, learner rewards and certificat­es.

The flaws enabled students and unauthenti­cated users to steal personal informatio­n, including names, emails, usernames and passwords; funnel money from an LMS to their bank account; change grades for themselves or peers; forge certificat­es; retrieve test answers; and escalate their system privileges to that of a teacher.

Following their discovery and disclosure by Check Point in March, all the identified vulnerabil­ities have been patched by the plugin developers.

Omri Herscovici, a vulnerabil­ity research team leader at Check Point, warned that students and employees are probably unaware of just how dangerous it can be to log into online learning websites.

“We proved that hackers could easily take control of the entire eLearning platform,” he said. “Top educationa­l institutio­ns, as well as many online academies, rely on the systems that we researched in order to run their entire online courses and training programs.”

“The vulnerabil­ities found allow students, and sometimes even unauthenti­cated users, to gain sensitive informatio­n or take control of the LMS platforms,” Herscovici said. “We urge the relevant educationa­l establishm­ents everywhere to update to the latest versions of all the platforms.”

Last week, researcher­s at Check Point warned that hackers are exploiting the rollout of massive government­al financial-relief packages to fill their pockets at the expense of businesses and affected workers.

A major increase in the registrati­on of malicious and suspicious domains related to relief packages has been recorded in recent weeks. The hackers aim to scam individual­s into providing personal informatio­n, thereby stealing money or committing fraud.

Some 94% of coronaviru­s-related cyberattac­ks during the past two weeks were phishing attacks, which attempt to trick users and collect sensitive data while appearing to be legitimate websites.

Approximat­ely 68,000 new coronaviru­s-related domains have been registered since the beginning of the outbreak in January, including nearly 17,000 since April 2. Of the new domains registered in recent weeks, 2% were found to be malicious and 21% were identified as suspicious.

 ?? (Gonzalo Fuentes/Reuters) ?? MILLIONS OF students and employees worldwide are turning to online-learning management systems to conduct virtual classes.
(Gonzalo Fuentes/Reuters) MILLIONS OF students and employees worldwide are turning to online-learning management systems to conduct virtual classes.

Newspapers in English

Newspapers from Israel