University of Zurich hacker attack raises sensitive questions – these are the points at stake

Is a notorious ransomware gang keeping the largest Swiss university in suspense? And why do the attacks continue? A renowned IT security expert makes a critical assessment.

Author: Daniel Schurter

How serious is the “cyber attack” at the University of Zurich (UZH) really? The information available so far paints an incomplete picture, as is often the case with ransomware attacks.

But is it really an action by Russian hackers? The “NZZ” spoke to a media official on Thursday, when the university made the attack public — and his answers raised new questions.

The university’s media office declined to provide detailed information Friday at Watson’s request. The accompanying justification will make you sit up and notice:

“The UZH is in the middle of the defense against cyber attacks. We therefore ask for your understanding that for tactical reasons we are currently unable to provide detailed information about the cyber-attack or defense measures.”

watson asked renowned IT security expert Marc Ruef for a critical review and explained why the case seems quite unusual.

Who is behind the “cyber attack”?

We do not know that.

In its statement, the university itself makes a connection with previous ransomware attacks.

“The authors appear to be acting very professionally and are part of a current spate of attacks against educational and health institutions. Only in the German-speaking area have there been several attacks on universities in recent weeks, forcing them to suspend their IT services for a longer period of time. The attacks are usually carried out by compromising several individual accounts and systems.”

This approach would be typical of the most dangerous ransomware gangs, which mostly operate from Russia.

The Vice Society group could be an option. It became known in Switzerland through the attack on the municipality of Rolle VD and the leak of sensitive data. And of all gangs, it launches the most attacks against educational institutions, be it primary schools or universities.

What are the DDoS attacks about?

A media official from the university spoke to the NZZ about attacks that had intensified “for a few days”. And furthermore: The hackers are said to have tested the university network in various ways.

“Some of these were Distributed Denial of Service (DDos) attacks – a concentrated multitude of attacks designed to bring down the system. Uni-IT managed to fend them off.”

Here, security expert Ruef reacts with surprise:

“That attackers use both destructive DDoS attacks and compromise [der IT-Netzwerke des Opfers] aspire to is very unusual. One business model has nothing to do with the other. Moreover, constructive attacks become difficult if the target environment is put under pressure at the same time.”

In addition, the extremely active ransomware gang Lockbit hinted last year that they could also use DDoS attacks in the future to further intimidate victims who do not want to pay. The American medium Bleeping Computer stated that the criminals would rely on triple extortion.

The FBI had previously warned that criminals could use server overload attacks as leverage to force victims to negotiate. And smaller, targeted DDoS attacks can be launched as a cover for installing malware (infiltration) or stealing data stealthily (exfiltration).

Why do all university members have to change their password?

After the cyber attack was made public on Thursday, the UZH website posted a request that made people sit up and take notice. The IT managers called for all passwords for the university systems to be changed.

“In order to protect the University of Zurich and their own individual data, all UZH members (students, employees, teachers) are hereby requested to immediately change their passwords for all accounts in Identity Management.”

The “Identity Management Service” is the central administration of all persons and accounts by the university’s IT service provider.

All employees and students have also been asked by e-mail to change their password.

Swiss IT security expert and former hacker Marc Ruef is critical of this move:

«The request to change the passwords only makes sense if it is clear that these credentials have been compromised. For example, because they were determined by a brute force attack, were intercepted while being entered, or were extracted from another leak.”

The security expert warns:

“If this is not the case, changing the passwords may even backfire, as the attackers could use this measure to steal the passwords.”

Why has VPN access changed?

Also logging in Virtual private network (VPN) The IT specialists have breathed new life into the university, writes the NZZ. “In this way we have been able to prevent new entry opportunities,” said the media official.

By way of explanation: A VPN service establishes a secure connection that leads, for example, from the professor’s private PC via the Internet to the university network. All data flowing through this virtual “tunnel” is encrypted.

Security expert Marc Ruef says:

«The ‘reset of the VPN’ is only necessary if it cannot withstand the attacks or in the medium term. If you only take care of the improvement during an ongoing attack, it’s actually a sign that you haven’t taken the risks seriously until now. »

In the academic environment, openness and freedom are very important, Ruef notes. This “unfortunately clashes with the needs of cybersecurity”. Many institutions therefore deliberately ignored the subject.

It is not known whether this was the case at the University of Zurich. The information so far and the ongoing cyber attacks do not allow conclusions yet.

Is the situation under control?

According to the university’s statement, defenses were immediately reinforced and the attacks were countered “with internal resources and external support”.

However, the attacks continued on Friday.

IT security expert Ruef:

“It seems like you currently have to play a game of cat and mouse and manually deflect the attack attempts. This saves a lot of time, resources and costs. An IT environment must be inherently robust so that it can defend against simple attack attempts without manual intervention. Otherwise it’s just not usable.”

On the university’s website, another message was posted on Friday afternoon under the topic “Support”, which shows that IT managers are under great pressure:

«There may currently be delays or errors when using various IT services. If you continue to have problems, please contact the IT department.»

The good news: so far (as of 5pm Friday afternoon) the IT infrastructure seems to be holding up. And the university’s website was also accessible.

How big is the damage?

There is no reliable information about this. Based on the available information, no all-clear can be given. On the contrary!

The university is concerned “about the security of research data and possible loss of information that could violate privacy protection”, it sounds.

That is why the responsible persons of the university also included experts in the field of data protection, the cantonal police and other universities. A police spokesperson confirmed to srf.ch on Friday that an investigation is underway.

All other Swiss universities and other educational institutions should also be extra alert. If the attackers succeeded in hijacking user accounts, targeted phishing emails threaten.

Sources

  • uzh.ch: Cyber ​​attack on the University of Zurich
  • nzz.ch: “It looks relatively serious”: a massive cyber attack hits the University of Zurich (subscription only)
  • srf.ch: Major cyber attack on the University of Zurich: the police are investigating

Author: Daniel Schurter

Source: Watson

follow:
Ella

Ella

I'm Ella Sammie, author specializing in the Technology sector. I have been writing for 24 Instatnt News since 2020, and am passionate about staying up to date with the latest developments in this ever-changing industry.

Related Posts