Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/28/2020
10:00 AM
James Lui
James Lui
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Safeguarding Schools Against RDP-Based Ransomware

How getting online learning right today will protect schools, and the communities they serve, for years to come.

The FBI has issued a warning to US K-12 school districts, advising them that they are being targeted by cyberthieves and should take extra precautions to secure their networks. With schools around the world responding to COVID-19 restrictions by moving to online learning, millions of students and teachers are logging on to school networks for classes and assignments. Many of them use unmanaged computers that are prone to vulnerabilities, creating countless opportunities for cybercriminals to use those devices as an attack vector to the internal network.

While the pandemic has opened new opportunities for cybercriminals, attacks on K-12 schools are nothing new. In fact, they have been on the rise for some time. The K-12 Cybersecurity Resource Center's Year in Review for 2019 reported 348 publicly disclosed "incidents" at schools, three times as many as in 2018. In 2020–2021, the FBI anticipates a major increase in attacks as schools begin to open, even as many states still struggle to contain the novel coronavirus, while others that were initially successful are battling a second wave following reopenings.

Related Content:

Don't Forget Cybersecurity on Your Back-to-School List

The Threat from the Internet—and What Your Organization Can Do About It

New on The Edge: h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling

Most school districts now acknowledge that things will not be back to normal this fall, and they are planning hybrid learning solutions for the school year. Hackers are delighted with this development since distance learning is often implemented using Microsoft's Remote Desktop Protocol (RDP), one of the prime targets for cybercriminals, aiming for quick gains. Their primary tactic: install ransomware that locks up data until ransoms are paid. Recently, in June 2020, the University of California San Francisco School of Medicine paid a ransom of over $1 million to regain access to important scientific data.

While a K-12 school or school district may not have data worth millions, cybercriminals know that schools often lack the resources large corporations deploy to guard against cyberattacks, which makes them prime targets. One specific attack vector the FBI has warned about is Ryuk ransomware, which is deployed via RDP endpoints, specifically students, parents, and teachers in the K-12 environment. Ryuk uses a sophisticated type of data encryption that targets backup files. Once the end user has been infected, that person can propagate the virus to the school's servers, where it can cause havoc.

"Vaccinating" Against Ransomware Infections
There are relatively simple and affordable steps to empower educational organizations providing distance learning, while keeping schools and districts safe from cyberthreats. The FBI recommends the following five steps:

Step 1: Backup your data. Make sure your backups cover your most important files.

Step 2: Secure your backups. Backups should not be connected to the computers and networks that are being backed up because anything that's connected to your network, including your backup files, can be encrypted in a ransomware attack. Also, if a good, up-to-date backup is available, there's no need to pay ransomware because all data can be quickly restored.

Step 3: Make sure that all software and operating systems are up to date and security patches are installed. It's important to make sure that all end users are updating their software, including parents, teachers, administrators, and students, in addition to software on the school's server. (Good luck with that!)

Step 4: Monitor all remote connections and software. Identify unusual activity, such as failed login attempts from any administrator-level account.

Step 5: Use two-factor authorization for login. Also apply "least privilege" controls, which allow users to access only the data and applications they need. This includes, for instance, allowing just read-only access, without the ability to alter content in any way, if students have no need to write while using a specific application.

Best Backup and Remote Access Security Practices
There are two effective ways to secure your backups from ransomware demands. The first is to use a backup that is completely offline. Why? Because if the backup is connected to the network, it likely won't help you; hackers now deploy tools that allow them to encrypt your backups as well. A disk backup may seem old-fashioned, but it's still an effective way to have a restorable backup in the event of a ransomware attack. It's also important to keep records of backups, so you can easily find the one created most recently, prior to the attack. Another advantage of storing disk backups off-site is they are available in the event of disaster such as fires or floods.

The second way to secure backups is to use cloud backup services. These services are designed with disaster recovery in mind and generally offer file versioning, which means you can restore from a backup that was done before your data was hijacked by ransomware and preserve your file structure, which makes the restore process much simpler.

Advanced Remote Access Software
Look for server-based software that is easy to control and maintain. Your IT professionals have the expertise to manage and deploy patches, but getting students, staff, and parents to update software that's installed on their devices, consistently and promptly, is a much greater challenge. The right software can be a lifesaver here. For example, some solutions are browser-based and, as a result, do not require software to be deployed on the devices themselves. Also, look for software that allows you to apply least-privilege access principles, giving different users varying levels of access (read versus write) to various applications and IT resources on servers.

Today's investment in securing online learning will also return long-term benefits. The pandemic has accelerated the digital transformation journey for many, and schools are likely to continue incorporating distance learning as an adjunct to the traditional classroom. So, getting it right today will protect schools, and the communities they serve, for years to come.

As Ericom's Group CTO of the Americas and one of the leading experts in and browser isolation, James has guided countless customers in healthcare, legal, finance, education and retail in architecting and deploying Ericom's wide range of enterprise-grade connectivity and ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
emil.sayegh@ntirety.com
50%
50%
[email protected],
User Rank: Author
9/28/2020 | 2:09:04 PM
Schools need to heed the cybersecurity threat
Spot on. 

As an IT practitioner, and as a parent, I totally agree that schools need to heed this warning.  Most are ill-prepared for remote learning, and hybrid learning.   High profile attacks, along with the Pandemic can risk the school year for many kids...
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Inside North Korea's Rapid Evolution to Cyber Superpower
Kelly Sheridan, Staff Editor, Dark Reading,  12/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27409
PUBLISHED: 2020-12-04
OpenSIS Community Edition before 7.5 is affected by a cross-site scripting (XSS) vulnerability in SideForStudent.php via the modname parameter.
CVE-2020-27408
PUBLISHED: 2020-12-04
OpenSIS Community Edition through 7.6 is affected by incorrect access controls for the file ResetUserInfo.php that allow an unauthenticated attacker to change the password of arbitrary users.
CVE-2020-27765
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/segment.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. This would most likely lead to an impact to application availability, but could potentially cause ot...
CVE-2020-27766
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/statistic.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of type `unsigned long`. This would most likely lead to an impact to application availability, b...
CVE-2020-27767
PUBLISHED: 2020-12-04
A flaw was found in ImageMagick in MagickCore/quantum.h. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of values outside the range of types `float` and `unsigned char`. This would most likely lead to an impact to application avai...