{"id":14881,"date":"2013-07-17T16:11:42","date_gmt":"2013-07-17T16:11:42","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=894"},"modified":"2019-11-15T23:20:53","modified_gmt":"2019-11-15T12:20:53","slug":"it-security-incidents-in-the-education-sector","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/it-security-incidents-in-the-education-sector\/14881\/","title":{"rendered":"IT Security Incidents in the Education Sector"},"content":{"rendered":"<p>Contemporary educational institutions in the US are now as computerized as any corporation or government agency and, in the case of technologically oriented universities, sometimes to an even greater extent. Educational organizations process personal data in a digital form are therefor confronted with the same security problems companies and governmental agencies experience. This article will examine some recent security incidents and their causes.<\/p>\n<p>One of the most sensational <a href=\"http:\/\/www.komonews.com\/news\/local\/Lake-Washington-schools-dealing-with-nasty-virus----a-computer-virus-181089371.html\" target=\"_blank\" rel=\"noopener nofollow\">stories<\/a> took place in the Lake Washington School District. In the fall of 2012, the computer virus Goblin (<a href=\"http:\/\/www.securelist.com\/en\/descriptions\/12288881\/Virus.Win32.Goblin.gen\" target=\"_blank\" rel=\"noopener nofollow\">Virus.Win32.Goblin.gen<\/a>) simultaneously struck a large number of schools\u2019 computers. Because it was just a virus, it did not spread via networks like a worm would do. Rather, it was a polymorphic file infector, which resided in shared sources and infected files with extensions .exe, .dll and .scr (screensavers). Moreover, it tried to download other malicious software from the Internet and tried to transfer some data from infected computers to a remote server.<\/p>\n<p>It was a seemingly unremarkable kind of malware, but it infected 25,000 computers in all 50 schools of the district in the vicinity of Redmond, Washington, which is home to Microsoft\u2019s headquarters. Many Microsoft employees\u2019 children go to those schools, bringing the problem to the backyard of Windows developers.<\/p>\n<p>This was a preventable IT incident too. In 2012, when the Lake Washington School District distributed laptops to all students for use at home and in the classroom, no one thought to include anti-malware protection on these computers. <i>After<\/i> the virus was discovered and the infection had spread, a school district spokesperson said that antivirus software and firewalls were enabled on all the computers.<\/p>\n<p>A similar case, on a smaller scale, occurred in April 2013 in the Salem School District in New Hampshire. The worm \u201cof an unknown origin\u201d infected the district\u2019s 85 servers and almost brought down the local Internet channels.<\/p>\n<p>Again, the local official interviewed <i>after<\/i> the malware was discovered: \u201cAt the moment we are installing an antivirus and then we are going to check all workstations separately.\u201d<\/p>\n<p>In addition to viruses and other malware, educational institutions are subject to attakcs both from outside and inside.<\/p>\n<p>In the Fall of 2012, a \u201chacktivist\u201d group named <a href=\"http:\/\/www.zdnet.com\/ghostshell-university-hack-by-the-numbers-7000005194\/\" target=\"_blank\" rel=\"noopener nofollow\">GhostShell published 120,000 disparate data sets<\/a>, stolen from the bases of major universities. The \u201chacktivists\u201d had paid unwelcomed visits to the universities\u2019 servers while running a \u201ccampaign\u201d under the name Project Westwind. The information this group published included 36,623 unique email addresses, the names of tens of thousands of students, faculty, and staff; and thousands of log-ins, unencrypted passwords, addresses, phone numbers, and very personal gender, date of birth, nationality, ethnicity, and civil status data. Fortunately, credit card numbers and social security numbers were not included in the published information.<\/p>\n<p>What did GhostShell want? They pointed out that their \u201ccampaign\u201d resulted from \u201c(inflated) tuition fees, political bias, rigid tutorial rules and unclear employment prospects for graduates,\u201d and claimed to be fighting for the good of people by means of SQL injections.<\/p>\n<p>In January 2013, <a href=\"http:\/\/www.esecurityplanet.com\/hackers\/mississippi-state-university-hacked.html\" target=\"_blank\" rel=\"noopener nofollow\">Mississippi State University (MSU) was the victim of a cyberattack<\/a>. It\u2019s widely believed that the attack was launched by a hacker named Gevolus, of the Brazilian Cyber Army. The attack resulted in the published passwords, addresses and emails of more than 500 students and teachers, as well as confidential admissions information.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/07\/06015802\/msuniver.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-896\" alt=\"msuniver\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/07\/06015802\/msuniver.jpg\" width=\"800\" height=\"170\"><\/a><\/p>\n<p>Apparently, Gevolus was simply demonstrating his cybercriminal abilities because there was no clear cause for his activities.<\/p>\n<p>In May of this year, <a href=\"http:\/\/www.chicoer.com\/breakingnews\/ci_23252226\/chico-schools-fight-off-cyber-attack\" target=\"_blank\" rel=\"noopener nofollow\">the Chico Unified School District was hit by DDoS-attack<\/a>, using computers in China, Europe, and the US. What made the cyberattack even more powerful was the fact that the same weblink was used by several government agencies, causing them to lose their Internet access for three days. Administrators of the school district network changed the web address and engaged the broader uplink, but the attacks soon resumed. Apparently, the servers were eventually transferred to an enclosed infrastructure and the criminals responsible for the Chico attack are still unidentified. Unfortunately, there are online instructions about organizing DDoS-attacks, and there are offers to rent the appropriate power for these criminal activities, making unprotected schools particularly vulnerable to attack.<\/p>\n<p>In June 2013, <a href=\"http:\/\/www.businessinsider.com\/purdue-university-students-charged-with-hacking-2013-6\" target=\"_blank\" rel=\"noopener nofollow\">three former students infiltrated Purdue University\u2019s servers<\/a> with a very clear intention:\u00a0 they wanted to change their grades. In this incident, the servers were attacked in a new way. The cybercriminals swapped the authorized teachers\u2019 keyboards for identical ones with hardware keyloggers installed.<\/p>\n<p><a href=\"http:\/\/www.reddit.com\/r\/sysadmin\/comments\/118dam\/just_got_dropped_in_way_over_my_head_im_now_the\/\" target=\"_blank\" rel=\"noopener nofollow\">Less than a year ago, Reddit published a plea from an overwhelmed student system administrator<\/a>. Apparently, after the departure of his former leader, this young student was entrusted with the management of the infrastructure of a small US college. \u00a0The author described his hardware and software as a real patchwork that included a few dozen computers with Windows XP Home Edition and a couple Vista platforms. Some desktops were more than ten years old and they were administered locally by two CentOS virtual machines acting as serves from the save Dell Desktop. The author tried, unsuccessfully, to persuade his authorities to choose Google Drive as a more effective option. He also wrote about the complete lack of backup, as the former system administrator (who worked part-time) kept copies of the system in his off-campus office. Despite these serious challenges, the school administration was seriously considering the introduction of a Bring Your Own Device (BYOD) policy.<\/p>\n<p>After reading the post, half the commenters strongly <a href=\"http:\/\/www.reddit.com\/r\/sysadmin\/comments\/118dam\/just_got_dropped_in_way_over_my_head_im_now_the\/c6k7s5u\" target=\"_blank\" rel=\"noopener nofollow\">advised the individual to flee<\/a> as soon as possible to avoid being blamed when something finally failed.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/07\/06015801\/minefield.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-897\" alt=\"minefield\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2013\/07\/06015801\/minefield.jpg\" width=\"800\" height=\"499\"><\/a><\/p>\n<p>However, the other half of the commenters provided competent and <a href=\"http:\/\/www.reddit.com\/r\/sysadmin\/comments\/118dam\/just_got_dropped_in_way_over_my_head_im_now_the\/c6kfjyd\" target=\"_blank\" rel=\"noopener nofollow\">sometimes extremely witty pieces of advice<\/a>. One commenter noted: \u201cI spent the last 3 years digging over 20 schools out of the same situations.\u201d<\/p>\n<p>Viruses, break-ins, internal sabotage, DDoS-attacks, and lack of resources- these few examples illustrate how educational institutions experience the same troubles faced by corporations and government offices, and then some. At the same time, these stories demonstrate the lack of appropriate IT security as well. Although there is little in the world to stop a crafty slacker from keylogging his professor\u2019s computer, the damage caused by viruses, worms, and exploitable vulnerabilities in the server are completely preventable if educational institutions invest in cyberprotection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Contemporary educational institutions in the US are now as computerized as any corporation or government agency and, in the case of technologically oriented universities, sometimes to an even greater extent.<\/p>\n","protected":false},"author":209,"featured_media":16434,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,2994],"tags":[2038,422,2037],"class_list":{"0":"post-14881","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-education-sector-seucirty","10":"tag-threats","11":"tag-vulnerability-assessment"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/it-security-incidents-in-the-education-sector\/14881\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/it-security-incidents-in-the-education-sector\/14881\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/it-security-incidents-in-the-education-sector\/14881\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/education-sector-seucirty\/","name":"Education Sector Seucirty"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14881","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=14881"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14881\/revisions"}],"predecessor-version":[{"id":25419,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/14881\/revisions\/25419"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/16434"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=14881"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=14881"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=14881"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}