December 9, 2022

Volume XII, Number 343


December 08, 2022

Subscribe to Latest Legal News and Analysis

December 07, 2022

Subscribe to Latest Legal News and Analysis

December 06, 2022

Subscribe to Latest Legal News and Analysis

Cyber Criminals Hone Attacks Against Schools

The FBI recently issued a Flash alert warning higher education institutions, k-12 schools, and seminaries about increasing numbers of ransomware attacks affecting the education industry.  According to the warning, “[s]ince March 2020, the FBI has become aware of PYSA ransomware attacks against U.S. and foreign government entities, educational institutions, private companies, and the healthcare sector by unidentified cyber actors.”

The ransomware attacks are initiated by gaining unauthorized access to networks either by exploiting Remote Desktop Protocol (RDP) credentials or phishing.  Then the PYSA ransomware extracts sensitive information and encrypts files with the .pysa extension.  In some circumstances, the attackers sell the extracted information on the dark web.  The FBI reports that some criminals will also remove the malicious files after deployment, thus making it even more difficult for the victims to discover what has happened.

The FBI does not recommend paying any ransom as it emboldens and encourages more criminal conduct.  Acknowledging that many educational institutions might choose to pay after determining few other options exist, the FBI points out that there is no guarantee that paying any ransom will result in the return of the data.

The FBI also suggests schools implement mitigation steps as follows:

  • Regularly back up data, air gap, and password protect backup copies offline. Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.

  • Implement network segmentation.

  • Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud).

  • Install updates/patch operating systems, software, and firmware as soon as they are released.

  • Use multifactor authentication where possible.

  • Regularly, change passwords to network systems and accounts, and avoid reusing passwords for different accounts. Implement the shortest acceptable timeframe for password changes.

  • Disable unused remote access/RDP ports and monitor remote access/RDP logs.

  • Audit user accounts with administrative privileges and configure access controls with least privilege in mind.

  • Install and regularly update anti-virus and anti-malware software on all hosts.

  • Only use secure networks and avoid using public Wi-Fi networks. Consider installing and using a VPN.

  • Consider adding an email banner to messages coming from outside your organizations.

  • Disable hyperlinks in received emails.

  • Focus on awareness and training. Provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities (i.e., ransomware and phishing scams).

Copyright © 2022 Robinson & Cole LLP. All rights reserved.National Law Review, Volume XI, Number 96

About this Author

Kathleen Dion, Robinson Cole Law Firm, Litigation Law Attorney, Hartford

Kathleen Dion, a member the firm's Litigation Section, focuses her practice on all aspects of civil and criminal litigation. She frequently handles cases related to education, government and internal investigations, and business disputes.

Education Law

Kate represents private schools, colleges, and universities in a variety of civil matters, such as tuition disputes, allegations of staff misconduct, and Title IX matters. She has assisted her clients in reaching favorable settlements in several employee...