Students Blamed For University & College Cyber Attacks

A security analysis of cyber-attacks against universities and colleges in the UK has discovered staff or students could often be responsible, rather than organised crime or hacking groups. 

A government-funded agency that provides cybersecurity has examined the timing of 850 attacks in 2017-18. Jisc found a "clear pattern" of attacks being concentrated during term times and during the working day. When the holidays begin, "the number of attacks decreases dramatically".

The analysis of cyberattacks on the research and academic network concludes there are "suspicions that staff or students could be in the frame".

Rather than criminal gangs or agents of foreign powers, the findings suggest many of the attacks on universities and colleges are more likely to have been caused by disgruntled staff or students wanting to provoke "chaos".
Stopping for the holidays

"It's notoriously difficult to identify individual cyber-criminals," says Dr John Chapman, head of security operations for Jisc, (formerly the Joint Information Systems Committee). But the agency, which provides internet and computer services across the higher and further education sectors, has produced a report showing that the peaks and troughs of attacks mirror when students and staff were most likely to be present.

They increased from 08:00 or 09:00 and then tailed off in the early afternoon. There was a very sharp decline in attacks in the Christmas, Easter and summer breaks and during half-terms - with attacks rising again sharply when terms resumed.
The incidence varied from more than 60 a week in some parts of the autumn term, down to one a week in mid-summer.
There were more than 850 attacks across the academic year, aimed at almost 190 universities and colleges. This was up from fewer than 600 attacks on about 140 institutions in the previous year.

These were sustained attempts at disrupting networks and did not include incidents such as phishing frauds or attempts to use "malware" or "ransomware".

Dr Chapman says the attempts could include sophisticated state-sponsored cyber-attacks from other countries and "serious criminal players", targeting research or trying to steal sensitive information. But the analysis suggests many of the attacks on networks seem to be closer to home.

These include so-called "denial of service" or "distributed denial of service" (DDoS) attacks where hackers try to stop or overload networks, crashing computer systems. In one case, the security team monitored a pattern of attacks on an institution and saw they began at 09:00, finished at 12:00, began again at 13:00 and then finished about 15:00 to 16:00.
This raised the question whether this was caused by a student or member of staff, who took a break at lunchtime.

Causing chaos
Another investigation located the source of what seemed to be a four-day cyber-attack on a university. It was found to be coming from a university hall of residence and had been the result of an online gamer who had been "attacking another gamer to try and secure an advantage".

Other reasons could be a misplaced sense of "fun" at disrupting networks, "kudos among peers" for causing chaos or because of a grudge over poor grades or "failure to secure a pay rise".
The Jisc analysis says another factor in the summer dip could have been an international effort to take down so-called "stresser" sites.

These websites provide the means for carrying out "denial of service" attacks, which Jisc says can be sold "under the pretense" that the buyer wants to carry out a test to see how well their own network would withstand such an attack.

"So, there is evidence... to suggest that students and staff may well be responsible for many of the DDoS attacks we see," says Dr Chapman.

"If connectivity to the network is lost for any length of time, it can be catastrophic for any organisation, both financially and reputationally."

BBC: 

You Might Also Read:

Fraudsters £350k Spoof University Emails:

Canadian University Hit For $12m Phishing Scam:
 

 

« A Cyber Attack Could Cause The Next Financial Crisis
What Every Small Business Should Know About Hackers & Cybersecurity »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Nubo Software

Nubo Software

Nubo’s Virtual Mobile Infrastructure creates a virtual corporate device on your employee smartphones and tablets. Enable unlimited mobility without leaving any data at risk.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Metro Systems

Metro Systems

Metro Systems offer fully integrated IT solutions & services covering Digital Transformation, Digital Infrastructure, Cyber Security and Training.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

VIPRE Security Group

VIPRE Security Group

VIPRE Security Group is an award-winning global cybersecurity, privacy and data protection company.

Stratosphere Networks

Stratosphere Networks

Stratosphere Networks offer managed cybersecurity services rooted in Managed Detection and Response and Security Operations Center services that our team can tailor to meet your needs.

SecondWrite

SecondWrite

SecondWrite’s next-generation malware detection engine delivers a combination of automatic deep code inspection and accurate scoring of zero-day malware.

MalwareFox

MalwareFox

MalwareFox is an advanced, yet simple-to-use anti-malware solution for Windows computers. We provide aggressive detection capabilities and an effective malware removal tool to keep your systems safe.

Orro Group

Orro Group

Orro create 'future now' solutions that make it faster, simpler and safer for you to access, store and share information. Wherever, whenever and with whomever you want.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

Socura

Socura

Socura helps make the digital world a safer place; changing the way organisations think about cyber security through a dynamic, innovative, and human approach.

TIM Enterprise

TIM Enterprise

TIM Enterprise offers innovative, sustainable and secure 360-degree digital solutions to companies and public administrations.

Uptime Institute

Uptime Institute

Uptime Institute is an unbiased advisory organization focused on improving the performance, efficiency, and reliability of business critical infrastructure.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

Krash Consulting

Krash Consulting

Krash Consulting is a premier provider of Cyber Security solutions, offering a range of services to safeguard businesses against cyber-attacks, minimize fraud, and protect brand reputation globally.