Students Blamed For University & College Cyber Attacks

A security analysis of cyber-attacks against universities and colleges in the UK has discovered staff or students could often be responsible, rather than organised crime or hacking groups. 

A government-funded agency that provides cybersecurity has examined the timing of 850 attacks in 2017-18. Jisc found a "clear pattern" of attacks being concentrated during term times and during the working day. When the holidays begin, "the number of attacks decreases dramatically".

The analysis of cyberattacks on the research and academic network concludes there are "suspicions that staff or students could be in the frame".

Rather than criminal gangs or agents of foreign powers, the findings suggest many of the attacks on universities and colleges are more likely to have been caused by disgruntled staff or students wanting to provoke "chaos".
Stopping for the holidays

"It's notoriously difficult to identify individual cyber-criminals," says Dr John Chapman, head of security operations for Jisc, (formerly the Joint Information Systems Committee). But the agency, which provides internet and computer services across the higher and further education sectors, has produced a report showing that the peaks and troughs of attacks mirror when students and staff were most likely to be present.

They increased from 08:00 or 09:00 and then tailed off in the early afternoon. There was a very sharp decline in attacks in the Christmas, Easter and summer breaks and during half-terms - with attacks rising again sharply when terms resumed.
The incidence varied from more than 60 a week in some parts of the autumn term, down to one a week in mid-summer.
There were more than 850 attacks across the academic year, aimed at almost 190 universities and colleges. This was up from fewer than 600 attacks on about 140 institutions in the previous year.

These were sustained attempts at disrupting networks and did not include incidents such as phishing frauds or attempts to use "malware" or "ransomware".

Dr Chapman says the attempts could include sophisticated state-sponsored cyber-attacks from other countries and "serious criminal players", targeting research or trying to steal sensitive information. But the analysis suggests many of the attacks on networks seem to be closer to home.

These include so-called "denial of service" or "distributed denial of service" (DDoS) attacks where hackers try to stop or overload networks, crashing computer systems. In one case, the security team monitored a pattern of attacks on an institution and saw they began at 09:00, finished at 12:00, began again at 13:00 and then finished about 15:00 to 16:00.
This raised the question whether this was caused by a student or member of staff, who took a break at lunchtime.

Causing chaos
Another investigation located the source of what seemed to be a four-day cyber-attack on a university. It was found to be coming from a university hall of residence and had been the result of an online gamer who had been "attacking another gamer to try and secure an advantage".

Other reasons could be a misplaced sense of "fun" at disrupting networks, "kudos among peers" for causing chaos or because of a grudge over poor grades or "failure to secure a pay rise".
The Jisc analysis says another factor in the summer dip could have been an international effort to take down so-called "stresser" sites.

These websites provide the means for carrying out "denial of service" attacks, which Jisc says can be sold "under the pretense" that the buyer wants to carry out a test to see how well their own network would withstand such an attack.

"So, there is evidence... to suggest that students and staff may well be responsible for many of the DDoS attacks we see," says Dr Chapman.

"If connectivity to the network is lost for any length of time, it can be catastrophic for any organisation, both financially and reputationally."

BBC: 

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Canadian University Hit For $12m Phishing Scam:
 

 

« A Cyber Attack Could Cause The Next Financial Crisis
What Every Small Business Should Know About Hackers & Cybersecurity »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

CSIRT GOV - Poland

CSIRT GOV - Poland

Computer Security Incident Response Team CSIRT GOV, run by the Head of the Internal Security Agency, acts as the national CSIRT responsible for coordinating the response to computer incidents.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

ES2

ES2

ES2 is a consulting organisation specialising in Enterprise Security and Solutions Services.

BIND 4.0

BIND 4.0

Bind 4.0 is an acceleration program geared toward tech startups with solutions applied to Advanced Manufacturing, Smart Energy, Health Tech or Food Tech fields.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Content+Cloud

Content+Cloud

Content+Cloud is a leading technology services business and Managed Services Provider (MSP) with a genuine passion for helping your organisation to succeed, whatever your ambitions.

Nineteen Group

Nineteen Group

Nineteen Group delivers major-scale exhibitions within the security, fire, emergency services, health and safety, facilities management and maintenance engineering sectors.

AMSYS Innovative Solutions

AMSYS Innovative Solutions

AMSYS is a full-service, 24/7/365 IT solutions, Cybersecurity & Managed Service Provider.

AccountabilIT

AccountabilIT

AccountabilIT is a full spectrum information technology services firm for enterprises with complex information technology needs seeking relief from those challenges.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Google Safety Engineering Center (GSEC)

Google Safety Engineering Center (GSEC)

GSEC Málaga is an international cybersecurity hub where Google experts work to understand the cyber threat landscape and to create tools that keep users around the world safer online.

AI or Not

AI or Not

AI or Not - Leverage AI to combat misinformation and elevate the landscape of compliance solutions.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.