Universities Targeted With Ransomware

Cyber criminals are willing to target schools and universities which store sensitive personal information linked to children and young adults, proving that these attackers don’t stop at anything if it succeeds in getting them the money they seek to extort.

Now, it emerges that two universities - the Munster Technology University (MTU) in Ireland and Technion, the  Israel Institute of Technology - have both been subjected to ransomware attacks and according to sources, Technion was hit by a criminal group known as DarkBit. 

MTU has said that data stolen in a recent cyber attack has been made available on the Dark Web, but it is still planning to open classes and will operate online with existing schedules. Students and staff at its Cork campuses have been advised to check their email accounts and campus notice boards on a regular basis for details of return-to-campus guidance and updates. 

The cyber attack on MTU's IT system which has only recently been detected, is believed to have been carried out by individuals in a ransomware group known as ALPHV also known as BlackCat or Noberus.

According to research carried out by threat analysts at SonicWall there was a 51% increase in ransomware attacks within the education sector in 2022. They predicted the education sector to be among the most targeted by cyber criminals in 2023. This is certainly proving to be true so far.  

Other findings from SonicWall include:

  •  A 110% increase in IOT/smart devices malware, attacking schools and universities relying on access cards, CCTV and remote learning as they adjust to hybrid learning
  •  A 42% increase in encrypted threats as bad actors tempt students to click on ‘dangerous’ links
  • A 22% increase in harmful malware in the education sector alone, which is much higher than the 3% average.

SonicWall's VP Channel Sales EMEA Spencer Starkey commented "The education and healthcare markets will be among the most targeted by cyber criminals in 2023. Both will be increasingly the subject of cyber attacks, including post-perimeter security on endpoint protection, identity information, and cloud access... Furthermore, both these industries are increasing their Internet of Things (IOT) footprint which will make them more susceptible to digital attacks."

SonicWall:     ITPro:      Irish Times:   Irish Examiner:    Bleeping Computer:   ComputingIndpendent.ie:

You Might Also Read: 

Who Was Responsible For Hacking Both IBM & Stanford University?:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Is Your Business Compliant With Data Sovereignty Requirements?
Twitter Wants Users To Pay For 2FA »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Digital Shadows

Digital Shadows

Digital Shadows is a cyber threat intelligence company that helps clients discover sensitive data exposed through social media, cloud services and mobile devices

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

SecuGen

SecuGen

SecuGen is a leading provider of advanced, optical fingerprint recognition technology, products, tools and platforms for physical and information security.

Prove & Run

Prove & Run

Prove & Run provides a patented software development toolchain that is specifically forged to deal with the complex security properties of sensitive software components.

Serverless Computing

Serverless Computing

Serverless Computing London will help architects, developers and CIOs decide on the best path to a more efficient, scalable and secure computing future.

authUSB

authUSB

authUSB Safe Door is a tool that provides secure access to the content of USB devices that circulate in organizations.

Workz Group

Workz Group

Workz connects and protects mobile subscribers of today and tomorrow by providing secure removable or embedded SIMs and remote provisioning solutions for consumer, M2M and IOT devices.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Cyber Lockout

Cyber Lockout

Comprehensive ransomware insurance and preventative cybersecurity technology solution, working together to help protect businesses 24/7/365.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

MDSec

MDSec

MDSec is a consultancy with a passion for information security. Our consultants specialise in application, mobile and hardware security and targeted red team attacks.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.