Times-Call (Longmont)

CU cyberattac­kers demand ransom

300K+ files ’potentiall­y compromise­d’ ; officials decline to pay

- BY KATIE LANGFORD STAFF WRITER

The University of Colorado received extortion demands related to a cyberattac­k that “potentiall­y compromise­d” personal informatio­n from more than 310,000 files, including student data, medical informatio­n and several Social Security numbers.

The attackers have posted small amounts of data on the dark web and threatened to post more if not paid, CU leaders announced in a news release Friday morning.

“The university does not intend to do so, following guidance from the FBI,” CU said in a statement. would not ensure that data is not posted, now or in the future, or that there would not be additional demands.”

The university system, as well as individual depar tments and people, have received specific extortion demands from the attackers in recent weeks, said spokespers­on Ken Mcconnello­gue.

An email from the attackers sent to a CU Boulder student Friday morning stated that “the administra­tion refuses to cooperate, in connection with which we notify you that your personal data … will be and already (is) partial“paying ly published on the darknet.”

System leaders were informed about an attack on its file sharing system, run by vendor Accellion, on Jan. 25 and immediatel­y shut down the ser vice. CU was one of at least 10 higher education institutio­ns involved in the attack, according to the university. About 50 organizati­ons were

affected by the attack, which the FBI is investigat­ing.

When CU first announced the attack in February, Mcconnello­gue described it as “the largest, most complex incident involving data” the system had ever seen. CU’S forensic investigat­ion confirmed that, Mcconnello­gue said Friday. The last cyberattac­k on CU was in 2005, which compromise­d about 50,000 records.

Files stolen in Januar y include grades and transcript data, student ID numbers, race/ethnicity data, veteran status, visa status, disability status and limited donor informatio­n.

Other files stolen include “some medical treatment, diagnosis and prescripti­on informatio­n, and in limited cases, Social Security numbers and university financial account informatio­n,” the release said.

Fewer than 20 Social Security numbers were identified in the more than 310,000 files accessed, Mcconnello­gue said.

Most of the more than 310,000 files accessed were from the Boulder campus, and some from the Denver campus. The Colorado Springs and Anschutz Medical campuses were not impacted.

Anyone whose data was involved in the attack will be notified next week, according to CU, and will be told what actions to take. The university system is providing credit monitoring, identity monitoring, fraud consultati­on and identity theft restoratio­n to those affected for one year.

CU was in the process of changing how it shared large files before the attack happened and accelerate­d that process after the attack, Mcconnello­gue said. CU is no lon ger using the Accellion software that the attackers were able to exploit.

“Part of what our informatio­n security folks will do is a lesson learned exercise — what can we do differentl­y and how can we adjust our practices immediatel­y,” Mcconnello­gue said.

The file transfer software used by CU was one of Accellion’s “legacy” products, according to the company’s website, and was developed 20 years ago. Accellion has been working for three years to transfer its clients to a newer and more secure platform, Kiteworks, which was not impacted by the attack, according to a company statement.

In February, Accellion announced an “end of life” date for the legacy file transfer software and that the company would no longer renew those software licenses after April 30.

Newspapers in English

Newspapers from United States