Brit college forced to shift all teaching online for a week while it picks up the pieces from ransomware attack

Plus: Stop bigging up these despicable criminals


An English college has temporarily closed all eight of its campuses and moved all teaching online after a "major" ransomware attack "disabled" its IT systems.

South and City College Birmingham (SCCB) has told its 13,000 students that all lectures will now be delivered via the web – and has urged them to stay away from the college's campuses for the rest of this week.

"The College has suffered a major ransomware attack on our IT system which has disabled many of our core IT systems," the institute said in a note to students posted on its website. "The College buildings will be closed to students for a week from Monday 15th March to allow our IT specialists to fix the problem."

Younger students - the 14 to 16-year olds getting vocational and academic qualifications at the college - will start to return on Monday, the college said.

There was no further information about the identity of the ransomware crew involved. We have asked SCCB for comment.

The FE Week news website for higher education professionals reported earlier this week that "servers and workstations connected to [the college's] domain" had been ransacked by criminals, with "a volume of data" being exfiltrated.

The authorities and the Information Commissioner's Office have been informed, according to FE Week.

Ransomware attacks are fairly commonplace in the COVID-19 era after much of the world shifted to remote working. It is relatively unusual for an organisation to state outright that it has been hit by ransomware, with most British orgs (including the University of the Highlands and Islands) preferring the coy phrase "cyber incident".

Educational bodies are merely the latest fashionable target among ransomware extortionists. Typically their attacks consist of either finding a vulnerable device on a target network and entering it through that, or a staffer opening a malware-laden email attachment. Either way, the criminals gain a foothold in the network from where they can deploy their software.

The ransomware itself works, as most Reg readers know, by encrypting all the files on the network and leaving a ransom note with contact details for the extortionists. In return for a hefty payout, usually seven figures, the criminals offer to send the decryption key to the victim. Variations on the theme include searching for and destroying backups as part of the attack; persisting in a target network for a period of time to poison regular backup runs; and stealing copies of sensitive and valuable data to ransom off separately.

This form of criminality has become very high profile, not least because of news reporting but also because its perpetrators fancy themselves as a cut above ordinary criminals – and some people buy into that self-created image.

Unethical

Infosec company Recorded Future, perhaps unwisely, gave a ransomware criminal claiming to be the leader of the REvil gang a platform from which the extortionist bragged about his "brand reputation".

The podcasters are not alone: the lure of ransomware gangs' infamy has also tempted the BBC, which last year seemingly allowed itself to be used as a force multiplier by a ransomware gang negotiating a payoff with a victim.

Recorded Future published a screenshot from a cybercrime forum where one crook boasted of making "calls to the media… to exert maximum pressure" on ransomware victims. Evidently the threat intel firm's staffer didn't make the connection between their own activity and the manipulation practised by the crooks.

The standard British government advice used to be never to pay a demanded ransom, and that is still sound advice today. In recent months the National Cyber Security Centre's line has shifted somewhat, opening the door to cyber-insurance providers who'll buy off extortionists on their clients' behalf. ®

Similar topics

Broader topics

Narrower topics


Other stories you might like

  • US won’t prosecute ‘good faith’ security researchers under CFAA
    Well, that clears things up? Maybe not.

    The US Justice Department has directed prosecutors not to charge "good-faith security researchers" with violating the Computer Fraud and Abuse Act (CFAA) if their reasons for hacking are ethical — things like bug hunting, responsible vulnerability disclosure, or above-board penetration testing.

    Good-faith, according to the policy [PDF], means using a computer "solely for purposes of good-faith testing, investigation, and/or correction of a security flaw or vulnerability."

    Additionally, this activity must be "carried out in a manner designed to avoid any harm to individuals or the public, and where the information derived from the activity is used primarily to promote the security or safety of the class of devices, machines, or online services to which the accessed computer belongs, or those who use such devices, machines, or online services."

    Continue reading
  • Intel plans immersion lab to chill its power-hungry chips
    AI chips are sucking down 600W+ and the solution could be to drown them.

    Intel this week unveiled a $700 million sustainability initiative to try innovative liquid and immersion cooling technologies to the datacenter.

    The project will see Intel construct a 200,000-square-foot "mega lab" approximately 20 miles west of Portland at its Hillsboro campus, where the chipmaker will qualify, test, and demo its expansive — and power hungry — datacenter portfolio using a variety of cooling tech.

    Alongside the lab, the x86 giant unveiled an open reference design for immersion cooling systems for its chips that is being developed by Intel Taiwan. The chip giant is hoping to bring other Taiwanese manufacturers into the fold and it'll then be rolled out globally.

    Continue reading
  • US recovers a record $15m from the 3ve ad-fraud crew
    Swiss banks cough up around half of the proceeds of crime

    The US government has recovered over $15 million in proceeds from the 3ve digital advertising fraud operation that cost businesses more than $29 million for ads that were never viewed.

    "This forfeiture is the largest international cybercrime recovery in the history of the Eastern District of New York," US Attorney Breon Peace said in a statement

    The action, Peace added, "sends a powerful message to those involved in cyber fraud that there are no boundaries to prosecuting these bad actors and locating their ill-gotten assets wherever they are in the world."

    Continue reading

Biting the hand that feeds IT © 1998–2022