Students Blamed For University & College Cyber Attacks

A security analysis of cyber-attacks against universities and colleges in the UK has discovered staff or students could often be responsible, rather than organised crime or hacking groups. 

A government-funded agency that provides cybersecurity has examined the timing of 850 attacks in 2017-18. Jisc found a "clear pattern" of attacks being concentrated during term times and during the working day. When the holidays begin, "the number of attacks decreases dramatically".

The analysis of cyberattacks on the research and academic network concludes there are "suspicions that staff or students could be in the frame".

Rather than criminal gangs or agents of foreign powers, the findings suggest many of the attacks on universities and colleges are more likely to have been caused by disgruntled staff or students wanting to provoke "chaos".
Stopping for the holidays

"It's notoriously difficult to identify individual cyber-criminals," says Dr John Chapman, head of security operations for Jisc, (formerly the Joint Information Systems Committee). But the agency, which provides internet and computer services across the higher and further education sectors, has produced a report showing that the peaks and troughs of attacks mirror when students and staff were most likely to be present.

They increased from 08:00 or 09:00 and then tailed off in the early afternoon. There was a very sharp decline in attacks in the Christmas, Easter and summer breaks and during half-terms - with attacks rising again sharply when terms resumed.
The incidence varied from more than 60 a week in some parts of the autumn term, down to one a week in mid-summer.
There were more than 850 attacks across the academic year, aimed at almost 190 universities and colleges. This was up from fewer than 600 attacks on about 140 institutions in the previous year.

These were sustained attempts at disrupting networks and did not include incidents such as phishing frauds or attempts to use "malware" or "ransomware".

Dr Chapman says the attempts could include sophisticated state-sponsored cyber-attacks from other countries and "serious criminal players", targeting research or trying to steal sensitive information. But the analysis suggests many of the attacks on networks seem to be closer to home.

These include so-called "denial of service" or "distributed denial of service" (DDoS) attacks where hackers try to stop or overload networks, crashing computer systems. In one case, the security team monitored a pattern of attacks on an institution and saw they began at 09:00, finished at 12:00, began again at 13:00 and then finished about 15:00 to 16:00.
This raised the question whether this was caused by a student or member of staff, who took a break at lunchtime.

Causing chaos
Another investigation located the source of what seemed to be a four-day cyber-attack on a university. It was found to be coming from a university hall of residence and had been the result of an online gamer who had been "attacking another gamer to try and secure an advantage".

Other reasons could be a misplaced sense of "fun" at disrupting networks, "kudos among peers" for causing chaos or because of a grudge over poor grades or "failure to secure a pay rise".
The Jisc analysis says another factor in the summer dip could have been an international effort to take down so-called "stresser" sites.

These websites provide the means for carrying out "denial of service" attacks, which Jisc says can be sold "under the pretense" that the buyer wants to carry out a test to see how well their own network would withstand such an attack.

"So, there is evidence... to suggest that students and staff may well be responsible for many of the DDoS attacks we see," says Dr Chapman.

"If connectivity to the network is lost for any length of time, it can be catastrophic for any organisation, both financially and reputationally."

BBC: 

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Canadian University Hit For $12m Phishing Scam:
 

 

« A Cyber Attack Could Cause The Next Financial Crisis
What Every Small Business Should Know About Hackers & Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CloudCodes Software

CloudCodes Software

CloudCodes is a cloud security solutions provider focused on providing cloud security solutions to enterprise customers.

IntelliGO Networks

IntelliGO Networks

IntelliGO Networks is a cybersecurity company focused on Managed Detection and Response (MDR).

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

SwiftSafe

SwiftSafe

SwiftSafe is a cybersecurity consulting company providing auditing, pentesting, compliance and managed security services.

Nakivo

Nakivo

NAKIVO is dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments.

Careerjet

Careerjet

Careerjet is a leading online job search engine with a large presence worldwide, sourcing millions of job ads from thousands of websites from all over the world in areas including Cybersecurity.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

Cyberstarts

Cyberstarts

Cyberstarts’ vision is to become the leading platform for amazing teams of entrepreneurs to solve the next big problems of the cybersecurity world.

Whistic

Whistic

Whistic is a cloud-based platform that uses a unique approach to address the challenges of third-party risk management.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

CIS Secure

CIS Secure

CIS Secure is an innovator, integrator and expert advisor supporting the broadest portfolio of powerful, mission-specific C5ISR communications and cybersecurity solutions.