{"id":21399,"date":"2020-07-19T05:54:50","date_gmt":"2020-07-19T05:54:50","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=21399"},"modified":"2020-07-24T13:56:25","modified_gmt":"2020-07-24T13:56:25","slug":"ransomware-criminals-are-targeting-us-universities","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/ransomware-criminals-are-targeting-us-universities\/","title":{"rendered":"Ransomware criminals are targeting US universities"},"content":{"rendered":"<p><a href=\"https:\/\/theconversation.com\/profiles\/nir-kshetri-227377\">Nir Kshetri<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-north-carolina-greensboro-2069\">University of North Carolina \u2013 Greensboro<\/a><\/em><\/p>\n<p>As COVID-19 cases in the U.S. <a href=\"https:\/\/coronavirus.jhu.edu\/map.html\">continue to climb<\/a>, government and higher education leaders have been focused on doing what it takes to protect campus communities from the global pandemic.<\/p>\n<p>But college and university leaders would be wise if they were just as vigilant about protecting their sensitive data from the cybercriminals who are becoming increasingly sophisticated about encrypting the colleges\u2019 data and making the colleges pay a ransom to get it back.<\/p>\n<p>One of the latest examples is a <a href=\"https:\/\/www.govtech.com\/security\/UCSF-Pays-Hackers-1-14M-to-Recover-Encrypted-Data.html\">ransomware attack<\/a> that struck the University of California, San Francisco on June 1. In that case, cybercriminals used the NetWalker malware to encrypt data on the servers of the university\u2019s school of medicine. This malware <a href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/netwalker-ransomware-what-need-know\/\">targets corporate networks and encrypts the data it finds on the attacked devices<\/a>. This means that the device owner cannot access data on the device <a href=\"https:\/\/www.incibe-cert.es\/en\/blog\/netwalker-ransomware-analysis-and-preventative-measures\">until a ransom in cryptocurrency demanded by the criminal is paid<\/a>. The criminal gang behind NetWalker has <a href=\"https:\/\/www.star-telegram.com\/news\/local\/crime\/article243959072.html\">victimized dozens of organizations<\/a>.<\/p>\n<p>UCSF said that the attackers breached important data related <a href=\"https:\/\/www.ucsf.edu\/news\/2020\/06\/417911\/update-it-security-incident-ucsf\">to its medical school faculty\u2019s research<\/a>. It says its <a href=\"https:\/\/threatpost.com\/ucsf-pays-1-14m-after-netwalker-ransomware-attack\/157015\/\">COVID-19 research was not affected<\/a>.<\/p>\n<p>Such ransomware attacks on universities have become <a href=\"https:\/\/www.jamesgmartin.center\/2020\/05\/as-budgets-tighten-colleges-still-vulnerable-to-ransomware\/\">common<\/a>. In 2019 alone, <a href=\"https:\/\/blog.emsisoft.com\/en\/34822\/the-state-of-ransomware-in-the-us-report-and-statistics-2019\/\">89 U.S. universities, colleges and school districts<\/a> became victims of such attacks, followed by <a href=\"https:\/\/edscoop.com\/netwalker-ransomware-columbia-college-ucsf\/\">at least 30<\/a> in the first five months of 2020.<\/p>\n<p>Along with the financial services industry, <a href=\"https:\/\/labs.sentinelone.com\/netwalker-ransomware-no-respite-no-english-required\/\">the education sector<\/a> is one of the two most common targets of these attacks.<\/p>\n<h2>Attempts to extort<\/h2>\n<p>I <a href=\"https:\/\/scholar.google.com\/citations?user=Qx3YMi4AAAAJ&amp;hl=en&amp;oi=ao\">research<\/a> <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S1075425305000700\">cybercrime<\/a> and <a href=\"https:\/\/www.palgrave.com\/gp\/book\/9781137021939\">cybersecurity<\/a>. I\u2019ve learned that obtaining ransom payments from their victims is the <a href=\"https:\/\/www.palgrave.com\/gp\/book\/9781137021939\">biggest challenge<\/a> most cybercriminals face, and that universities perform poorly on cybersecurity. Their vulnerabilities are becoming easier to exploit thanks to cryptocurrencies, such as bitcoin, which <a href=\"https:\/\/theconversation.com\/are-cryptocurrencies-a-dream-come-true-for-cyber-extortionists-80115\">make it easier for cybercriminals to extract payments<\/a> from their victims.<\/p>\n<p>In the case of UCSF, university officials transferred <a href=\"https:\/\/www.bbc.com\/news\/technology-53214783\">116.4 bitcoins \u2013 the equivalent of US$1.14 million \u2013 <\/a> to the cryptocurrency wallet of the NetWalker gang and <a href=\"https:\/\/threatpost.com\/ucsf-pays-1-14m-after-netwalker-ransomware-attack\/157015\/\">received the key to decrypt its own files<\/a> in return.<\/p>\n<p>NetWalker is sophisticated malware. To distribute ransomware, NetWalker creators rely on <a href=\"https:\/\/threatpost.com\/netwalker-ransomware-gang-top-notch-affiliates\/155946\/\">phishing and spam as well as other large-scale network infiltration<\/a> such as hacking unsecured wireless devices connected to Wi-Fi networks.<\/p>\n<p>After penetrating a network, it can <a href=\"https:\/\/www.computing.co.uk\/news\/4012969\/hospitals-coronavirus-ransomware\">render antivirus software useless<\/a>.<\/p>\n<p>[<em>You\u2019re smart and curious about the world. So are The Conversation\u2019s authors and editors.<\/em> <a href=\"https:\/\/theconversation.com\/us\/newsletters\/weekly-highlights-61?utm_source=TCUS&amp;utm_medium=inline-link&amp;utm_campaign=newsletter-text&amp;utm_content=weeklysmart\">You can get our highlights each weekend<\/a>.]<\/p>\n<p>The criminal group behind NetWalker mainly pursues <a href=\"https:\/\/labs.sentinelone.com\/netwalker-ransomware-no-respite-no-english-required\/\">high-value targets<\/a>, such as the <a href=\"https:\/\/siliconangle.com\/2020\/03\/16\/ransomware-targets-hospitals-medical-providers-coronavirus-pandemic\/\">Champaign-Urbana Public Health District in Illinois<\/a> and <a href=\"https:\/\/cointelegraph.com\/news\/michigan-state-university-hit-by-ransomware-refuses-to-pay-criminals\">Michigan State University<\/a>.<\/p>\n<p>The creators of NetWalker are believed to collaborate with about <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/netwalker-adjusts-ransomware-operation-to-only-target-enterprise\/\">10 to 15 affiliates<\/a> to distribute the malware. The affiliates, who are <a href=\"https:\/\/threatpost.com\/netwalker-ransomware-gang-top-notch-affiliates\/155946\/\">often less skillful criminal hackers than the creators of NetWalker<\/a>, infiltrate a victim\u2019s network and infect it with the ransomware. They later split any ransom money obtained with NetWalker\u2019s creators.<\/p>\n<h2>Why higher ed is a target<\/h2>\n<figure class=\"align-center \"><img src=\"https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=431&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=431&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=431&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=541&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=541&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/347428\/original\/file-20200714-30-xjtuep.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=541&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><figcaption><span class=\"caption\">US colleges have weak cybersecurity systems.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.gettyimages.com\/detail\/photo\/cyber-crime-reflection-in-spectacles-of-virus-royalty-free-image\/1158867526?adppopup=true\">Westend6\/GettyImages<\/a><\/span><\/figcaption><\/figure>\n<p>In my view, colleges and universities have become attractive targets for cybercriminals because of their weak cybersecurity measures. Research shows that the <a href=\"https:\/\/edtechmagazine.com\/k12\/article\/2018\/12\/3-ways-k-12-schools-can-improve-their-cybersecurity-2019\">education sector<\/a> is the <a href=\"https:\/\/securityscorecard.com\/resources\/2018-education-report\">least-prepared to fend off cyberattacks<\/a>. In a vulnerability test of U.K. universities, hackers obtained sensitive and valuable data in all cases <a href=\"https:\/\/www.bbc.com\/news\/education-47805451\">within two hours<\/a>.<\/p>\n<p>University networks contain highly sensitive information related to research, patents and other types of intellectual property data. These are targets cybercriminals desire.<\/p>\n<p>Most students use the universities\u2019 wireless networks to access information. Email addresses and other information about faculty, staff and students are easily available. Cybercriminals can use such information to send phishing emails.<\/p>\n<p>It doesn\u2019t help that some universities rely on <a href=\"https:\/\/www.zdnet.com\/article\/hackers-target-62-us-colleges-by-exploiting-erp-vulnerability\/\">outdated and insecure software<\/a>. Or that <a href=\"https:\/\/www2.deloitte.com\/content\/dam\/Deloitte\/us\/Documents\/public-sector\/us-ps-elevating-cybersecurity-on-the-higher-education-leadership-agenda.pdf\">departments and individual professors<\/a> store some of the most sensitive data without help from cybersecurity specialists within their universities.<\/p>\n<h2>To pay or not to pay<\/h2>\n<p>Generally <a href=\"https:\/\/www.ic3.gov\/media\/2019\/191002.aspx\">law enforcement agencies<\/a> and <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/may\/15\/dont-pay-ransomware-demands-cybersecurity-experts-say-wannacry\">cysersecurity professionals<\/a> oppose paying ransom. The FBI has suggested that victims report to law enforcement, <a href=\"https:\/\/www.ic3.gov\/media\/2019\/191002.aspx\">whether or not they are willing to make those payments<\/a>.<\/p>\n<p>Extortionists promise to provide the victims with encryption keys for unlocking encrypted data if ransom is paid. NetWalker and some other ransomware criminals <a href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/netwalker-ransomware-what-need-know\/\">threaten to publish victims\u2019 data<\/a> on <a href=\"https:\/\/www.zdnet.com\/article\/heres-a-list-of-all-the-ransomware-gangs-who-will-steal-and-leak-your-data-if-you-dont-pay\/\">information leak websites<\/a> otherwise.<\/p>\n<p>Many victims distrust the extortionists and doubt their promises to <a href=\"https:\/\/www.computer.org\/csdl\/magazine\/it\/2017\/05\/mit2017050011\/13rRUyuNsBL\">unlock data after ransom payments<\/a>. This fear is well-founded. In 2016, <a href=\"https:\/\/www.salon.com\/2017\/09\/13\/httpstheconversation-comare-cryptocurrencies-a-dream-come-true-for-cyber-extortionists-80115_partner\/?ref=hvper.com\">only a quarter of organizations<\/a> that paid ransoms recovered their data.<\/p>\n<p>Desperate victims may decide to pay, hoping that the criminals behind the attacks fulfill their promise to decrypt data. <a href=\"https:\/\/www.technologyreview.com\/2016\/06\/07\/159783\/companies-are-stockpiling-bitcoin-to-pay-off-cybercriminals\/\">Cornell University reportedly bought bitcoins<\/a> to pay to extortionists in case of a future ransomware attack. If companies rely on data, paying ransom could be less costly than the alternative.<\/p>\n<p>Recently, ransomware criminals <a href=\"https:\/\/threatpost.com\/netwalker-ransomware-gang-top-notch-affiliates\/155946\/\">are becoming more selective<\/a>, going after only victims for whom data is extremely important.<\/p>\n<p>Some recent victims of NetWalker also reported that they successfully recovered most of their data after paying the ransom. In March, NetWalker had <a href=\"https:\/\/siliconangle.com\/2020\/03\/16\/ransomware-targets-hospitals-medical-providers-coronavirus-pandemic\/\">hijacked the computer networks of the Champaign-Urbana Public Health District<\/a> in Illinois, which serves 210,000 people including the University of Illinois. After paying a <a href=\"https:\/\/gcn.com\/articles\/2020\/04\/17\/health-care-ransomware-targets.aspx\">$350,000 ransom<\/a>, the Champaign-Urbana Public Health District <a href=\"https:\/\/www.smartbrief.com\/original\/2020\/04\/health-care-cybersecurity-new-front-coronavirus-battle\">retrieved 99% of its files<\/a>.<\/p>\n<p>A growing number of organizations now buy <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0308596120300999?dgcid=author\">cyber insurance to protect against future losses<\/a> from these attacks. An insurer, for example, paid <a href=\"https:\/\/gcn.com\/articles\/2020\/04\/17\/health-care-ransomware-targets.aspx\">all but $10,000 of the Champaign-Urbana Public Health District\u2019s ransom<\/a>.<\/p>\n<h2>Tracking ransomware perpetrators<\/h2>\n<figure class=\"align-center \"><img src=\"https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=397&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=397&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=397&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=499&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=499&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/347429\/original\/file-20200714-139854-bqeqjn.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=499&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><figcaption><span class=\"caption\">Most ransomware hackers operate outside of U.S. jurisdiction.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/www.gettyimages.com\/detail\/photo\/hacker-royalty-free-image\/914818226?adppopup=true\">seksan Mongkhonkhamsao\/GettyImages<\/a><\/span><\/figcaption><\/figure>\n<p>Most ransomware criminals, however, operate from jurisdictions that don\u2019t cooperate with the U.S. or European authorities fighting cybercrimes. For instance, the criminals behind NetWalker are believed to operate from <a href=\"https:\/\/www.tripwire.com\/state-of-security\/featured\/netwalker-ransomware-what-need-know\/\">Russia or other Commonwealth of Independent States<\/a>.<\/p>\n<p>To shore up their digital security, universities should mandate strong passwords and encourage all faculty, students and staff to report fake emails and other incidents. It would also help if they could constantly back up important data and purchase cyber insurance.<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/141932\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/nir-kshetri-227377\">Nir Kshetri<\/a>, Professor of Management, <em><a href=\"https:\/\/theconversation.com\/institutions\/university-of-north-carolina-greensboro-2069\">University of North Carolina \u2013 Greensboro<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/ransomware-criminals-are-targeting-us-universities-141932\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nir Kshetri, University of North Carolina \u2013 Greensboro As COVID-19 cases in the U.S. continue to climb, government and higher education leaders have been focused on doing what it takes to protect campus communities from the global pandemic. But college and university leaders would be wise if they were just as vigilant about protecting their [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":21400,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[292],"tags":[8373,7689,614,612,6419,6975,1812],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/21399"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=21399"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/21399\/revisions"}],"predecessor-version":[{"id":21470,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/21399\/revisions\/21470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/21400"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=21399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=21399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=21399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}