How U.S. and Canadian Universities and Colleges Dealt with Malware and Ransomware Attacks in 2016-2017
Full text | |||
Source | Journal of Information Systems Security Volume 15, Number 2 (2019)
Pages 117–158
ISSN 1551-0123 (Print)ISSN 1551-0808 (Online) |
||
Authors | Bernadette Schell — Laurentian University, Sudbury, Ontario, Canada
Kalpdrum Passi — Laurentian University, Sudbury, Ontario, Canada
Luc Roy — Laurentian University, Sudbury, Ontario, Canada
|
||
Publisher | Information Institute Publishing, Washington DC, USA |
Abstract
In February 2016, Hollywood Presbyterian Medical Center’s network was brought to a standstill for over a week as the hospital IT team worked diligently to recover from a ransomware attack. During the attack, hospital administrators declared an internal state of emergency as medical staff struggled—without success—to access patient records and critical computer systems critical to maintain adequate patient care. Because of these issues, some patients were transported to other functioning hospitals. The affected hospital’s computer systems were literally held hostage until a ransom of 40 Bitcoins—approximately $17.00 —was paid. Only then could the targeted hospital regain control and its files—encrypted by malware. Since this 2016 incident, at least three more healthcare organizations in the United States publicly reported operational disruptions due to crippling ransomware attacks. (LogRythm 2017). Add to the ransomware attack mix small, medium, and large businesses, government offices, educational post-secondary institutions, and financial institutions during this time period and it becomes understandable why the Institute of Critical Infrastructure Technology dubbed 2016 “the year ransomware will hold America hostage.” (LogRhythm 2017). To date, no study has reported how U.S. and Canadian universities have fared in the war against ransomware and vicious malware attacks during this period. This paper attempts to fill this void by providing descriptive statistics from online survey results delineating how a self-selected group of US and Canadian universities/colleges were affected by malware attacks on their networks in the 2017 academic year, and how satisfied the IT security experts at these institutions were with their capability to prevent, detect, contain, and recover from such attacks. Their views were compared with those reported by their industrial sector counterparts in previous years.
Keywords
Ransomware and Malware Attacks, Disaster Recovery Planning, Employee Training on Malware Attacks, Risk Management
References
Blake, A. (2017). Police surveillance system hacked in D.C. prior to Trump’s inauguration. Retrieved February 5, 2017, from http: www.washingtontimes.com
Brewer, (2016). R. Ransomware attacks: detection, prevention, and cure. Network Security, 9: 5-9.
Castaldo, J. (2018). ‘Many companies not ready for new data-breach response rules, experts say. The Globe and Mail, 29 October 2018, p B2.
Cisco. (2016). Midyear Cyber-security Report’. Retrieved September 2016, from http://bit.ly/2bnFSXY
Cisco. (2017). Cisco Ransomware Defense. Retrieved February 3, 2017, from http://www.bitpipe.com/data/loadAsset.action?resId=1474906295_271&noonclick=true
Computer Fraud and Security. UK major target for ransomware. (2016). Computer Fraud and Security, 20 (2016): 3.
Computer Fraud and Security. Ransomware hiding in the dark. (2015). Computer Fraud and Security, 9 (2015): 3-20.
Cooper, D. Highlights of the Canada Digital Privacy Act 2015. (2015): Retrieved June 24, 2015, from https://www.insideprivacy.com/international/canada/highlights-of-the-canada-digital-privacy-act-2015/
Crocetti, P. (2017). Protection against ransomware becomes practical priority. Retrieved January 23, 2017, from http://searchdisasterrecovery.techtarget.com/news/
450411506/Protection-against-ransomware-becomes-practical-priority?utm_medium
=EM&asrc=EM_NLN_72051850&utm_campaign=20170202_Explorewaystointerceptransomwareattacks&utm_source=NLN&track=NL-1821&ad=912600&src=912600.
Hejazi, W., Lefort, A., Etges, R., and B. Sapiro. (2011). Chapter 12: The 2009 Rotman-TELUS Joint Study on IT Security Best Practices: Compared to the United States, How Well is the Canadian Industry Doing? In Holt, T.J. & Schell, B.H. IGI Global (Hershey, PA). Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
Holt, T.J. and Schell, B.H. (2010). IGI Global (Hershey, PA). Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (pp 228-265).
Kaspersky Lab. How Big a Threat is Cryptomalware to SMBs? (2017). Retrieved January 25, 2017, from https://go.kaspersky.com/rs/802-IJN-240/images/When_Cryotors_Attack_Snapshot.pdf?aliId=311184190
Liska, A. (2018). Ransomware Trends. Retrieved October 9, 2019, from https://www.informationsecuritybuzz.com/articles/2018-ransomware-trends/
LogRhythm. (2016). The Ransomware Threat: A Guide to Detecting an Attack Before It’s Too Late. Retrieved February 4, 2019, from http://docs.media.bitpipe.com/io_13x/io_134469/item_1441371/LogRhythm-
ransomware-threat-guide.pdf
Luo, X. and Liao, Q. (2007). Awareness education as the key to ransomware prevention, Information Systems Security, September 2007, 16:4,195–202.
Mansfield-Devine, S. (2016). Ransomware: Taking Businesses Hostage. Network Security (October, 2016): 8-17.
McGinn, S. (2017). Universities must take steps to protect against ransomware attacks. Retrieved February 1, 2017, from http://www.universityaffairs.ca/news/news-article/universities-must-take-steps-protect-ransomware-attacks/
Monika, Zavarsky, P., Lindskog, D. (2016). Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization. Computer Science, 94 (2016): 465–472.
Network Security. (2016). Ransomware claims more victims. Network Security, 12 (December, 2016): 2.
Network Security (2016). Ransomware menace grows as new threats emerge. Network Security. 8 (August, 2016): 1-2.
Osterman Research Inc. (2016). Understanding the depth of the global ransomware problem. An Osterman Survey Research Report. Retrieved August, 2016, from https://www.malwarebytes.com/surveys/ransomware
Radware. C-Suite Perspectives 2018: Trends in the cyberattack landscape, security threats, and business impacts. https://media.bitpipe.com/io_14x/io_142111/item_
1680940/rad0806_ExecutiveReport_FINAL.PDF
Scaife, N., Carter, H., Traynor, P. and Butler, K. (2016). CryptoLock (and Drop It): Stopping ransomware attacks on user data. 2016 IEEE 36th International Conference on Distributed Computing Systems. Retrieved September 2016 from http://www.cise.ufl.edu/~traynor/papers/scaife-icdcs16.pdf.
Schell, B.H., and Martin, C. (2006). Webster’s New World Hacker Dictionary. Indianapolis: Wiley Publishing, Inc., 2006.
Schell, B.H. (2006). Online Health and Safety: From Cyberbullying to Internet Addiction. Santa Barbara: Greenwood, 2016.
Torproject.org. Anonymity Online. (2017). Retrieved January 26, 2017, from https://www.torproject.org/
Versa Networks. (2017). Top 10 ransomware. Retrieved October 9, 2018, from https://media.bitpipe.com/io_14x/io_141921/item_1674444/versa-sr-topransomeware2017.pdf