Comment: University of California paid £1 Million ransom to Cyber criminals

By   ISBuzz Team
Writer , Information Security Buzz | Jun 29, 2020 04:13 am PST

The University of California in San Francisco (UCSF) says it has paid cybercriminals $1.14 million (£1 million) to decrypt a “limited number of servers” in its School of Medicine, which were hit by ransomware this month.

Subscribe
Notify of
guest
2 Expert Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Marcus Fowler
Marcus Fowler , Director of Strategic Threat
June 29, 2020 3:33 pm

Criminals continue to focus ransomware on targets they can pressure to pay, including hospitals, healthcare, cities/municipalities, and schools, especially higher educational institutions and those involved in research. Research data and information is difficult, if not impossible, to replace depending on the experiments and data collected. This makes it valuable to cyber-criminals, and also critical to defend. The BBC article showcases a number of the levers the attackers used to pressure the university to pay, such as public declaration, release of data, and limited time frame. The visual of ‘staff running around unplugging machines to prevent the spread’ gives a good sense of the speed with which the attack occurs. The security teams defaulted to the most immediate and dramatic response – physically unplugging machines. The key to preventing ransomware is 1) understanding what normal looks like for a digital environment so that you can identify the smallest deviations that reveal the earliest signs of a cyber-attack, and 2) having an autonomous response in place to stop attacks in the earliest moments and prevent any disruption to business operations.

Last edited 3 years ago by Marcus Fowler
Ilia Kolochenko
Ilia Kolochenko , Founder and CEO
June 29, 2020 12:16 pm

The disclosed technical details of the attack are obscure and insufficient to derive definitive conclusions about the origins and nature of this exorbitant incident. In light of the well-known malware reportedly used in the attack, we may, however, assume that the attack exploited a lack of IT asset visibility, improperly implemented security monitoring or patch management.

Public schools frequently save money on cybersecurity, trying to invest budgets into apparently more appealing areas to deliver more value for students and society. Unfortunately, the road to hell is paved with good intentions, and unscrupulous attackers readily exploit any inadequate resilience and unpreparedness to extort money. Covid-19 largely exacerbates the situation with the surge of shadow IT, abandoned servers, and unprotected applications serving as an easy entry point into disrupted organizations. Cryptocurrencies turn cyber extortion and racketeering into a highly profitable and riskless business given that in most cases the attackers are technically untraceable and thus enjoy impunity. We will likely see a steady growth of ransomware hacking campaigns targeting the public sector in 2020.

Last edited 3 years ago by Ilia Kolochenko

Recent Posts

2
0
Would love your thoughts, please comment.x
()
x