Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

4/13/2020
01:05 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Pandemic Could Make Schools Bigger Targets of Ransomware Attacks

Most have had to implement distance learning, making them much more vulnerable, Armor says.

Schools and colleges could become big ransomware targets for attackers looking to exploit the sudden surge in distance learning caused by the COVID-19 pandemic.

Between Jan. 1 and April 8, at least 17 school districts and colleges — comprising 284 entities — were hit by ransomware attacks. That was more than double the total of eight school districts and colleges that were hit in similar attacks during the same period last year, security vendor Armor said in a report this week.

All but one of the attacks happened before individual states began implementing stay-at-home orders in the second half of March. So, at least this far, the attacks have not been pandemic-related. But that could change soon, says Chris Hinkley, head of the Counter Threat Unit (CTU) research team at Armor.

"There is a very strong possibility that the [ransomware] attacks against schools and colleges will increase," Hinkley says.

Attackers know that academic institutions cannot fall back to teaching students in person and therefore are more likely to be pressured into paying a ransom to regain access to their systems. Additionally, IT staff at school districts and colleges are likely going to be overloaded supporting distance-learning measures and are not monitoring their networks as closely as they might have otherwise.

"We do believe that the ransomware threat actors will continue their activity and certainly will not curb it, as this situation gives them an advantage," Hinkley says.

Already this year, educational institutions have been more heavily targeted than organizations in almost any other sector. According to Armor, there have been more attacks on schools and colleges this year than on municipal governments, which were the most heavily targeted entities in 2019. Between Jan. 1, 2019, and this month, a total of 94 school districts comprising some 1,150 schools have been impacted by ransomware attacks.

In several of these incidents, school districts were forced to pull their distance-learning platforms offline following a ransomare attack. As one example, Armor pointed to an incident at Indiana's Penn-Harris-Madison School Corp. in late 2019 that knocked out all internal network systems districtwide. The systems that were impacted in the attack included Canvas, an online platform that students use to access and submit work, and Skyward, a platform for tracking attendance and sharing information with families.

In similar attacks at the Las Cruces Public Schools system in New Mexico and Havre Public Schools in Montana last year, the districts were forced to take their entire networks offline for days following separate ransomware attacks.

In some incidents, school districts have been forced to do the same as a precautionary measure after a ransomware attack. The Nacogdoches Independent School District in Texas, for instance, last year opted to pull the plug on its entire computer network for days to minimize damage after attackers locked down files on some of its PCs.

Slow Recovery
As with organizations in other sectors, the time frame for a school district or college to recover from a ransomware attack has tended to vary depending on the school's data and system backups, as well as the extent of the damage that was done to its network, servers, and devices. "However, overall, we have not seen schools recover quickly" compared to organizations in other industries, Hinkley says.

Of the 17 school districts and colleges that were hit in ransomware attacks this year, only two publicly stated they were not going to pay, Hinkley says. It's unclear whether any of the others paid a ransom to get back access to their systems.

"We do believe the costs for recovery and to resume in a stable, functional state will depend on the reliability and extensiveness of the school's backup system, the breadth of the damage created, and the security protections needed to prevent a similar attack from happening a second time," Hinkley says.

A report by Absolute last year, based on anonymized data from over 3.2 million endpoint devices in schools, found that technology complexity has heightened the risk of data breaches and ransomware attacks at many schools. The security vendor found that over the past few years, many schools have gone from managing a few hundred devices, a handful of apps, and a couple of operating systems to managing hundreds of versions of operating systems, apps, and extensions, and thousands of systems.

"The diversity of device types, operating systems, and applications adds unprecedented complexity to today's digital districts and campuses," Absolute said.

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's featured story: "When All Behavior is Abnormal, How Do We Detect Anomalies?"

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
4/16/2020 | 2:01:13 PM
Interesting post
I think with the schools, it is the administrative staff that does not put emphasis (money) into the schools IT, education and training. They are more concerned with the bottom-line as opposed to external threats.

For example, a number of applications that I identified still had the admin user name and password, no one took the time to change it and there are a number of applications and devices that are still set to default settings, they just take it out fo the box, configure it for the network and attach it for kids to use.

Ransomware Hit Over 1,000 U.S. Schools in 2019

In addition, the kids who are in the schools have been causing some of the attacks because they have found holes or vulnerabilities where they continue to exploit and use for their own purposes.

What needs to happen is that for every device that enters into the school, there needs to be a preconfigured template they use (planning will play a big part) and then deploy the solution without intervention from the admin IT staff (that is usually one person who has been appointed to do the job), provide adequate training to people who have done this before and look into other applications other than Windows (someone said that if the schools would create a team of well trained students to help with the Ransomeware issue, they could help the admin staff - a type of project - address the IT needs, empowering the school and the kids as well).

Todd
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/4/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13768
PUBLISHED: 2020-06-04
In MiniShare before 1.4.2, there is a stack-based buffer overflow via an HTTP PUT request, which allows an attacker to achieve arbitrary code execution, a similar issue to CVE-2018-19861, CVE-2018-19862, and CVE-2019-17601. NOTE: this product is discontinued.
CVE-2020-13849
PUBLISHED: 2020-06-04
The MQTT protocol 3.1.1 requires a server to set a timeout value of 1.5 times the Keep-Alive value specified by a client, which allows remote attackers to cause a denial of service (loss of the ability to establish new connections), as demonstrated by SlowITe.
CVE-2020-13848
PUBLISHED: 2020-06-04
Portable UPnP SDK (aka libupnp) 1.12.1 and earlier allows remote attackers to cause a denial of service (crash) via a crafted SSDP message due to a NULL pointer dereference in the functions FindServiceControlURLPath and FindServiceEventURLPath in genlib/service_table/service_table.c.
CVE-2020-11682
PUBLISHED: 2020-06-04
Castel NextGen DVR v1.0.0 is vulnerable to CSRF in all state-changing request. A __RequestVerificationToken is set by the web interface, and included in requests sent by web interface. However, this token is not verified by the application: the token can be removed from all requests and the request ...
CVE-2020-12847
PUBLISHED: 2020-06-04
Pydio Cells 2.0.4 web application offers an administrative console named “Cells Console� that is available to users with an administrator role. This console provides an administrator user with the possibility of changing several settings, including the applicat...