Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:00 AM
James Lui
James Lui
Connect Directly
E-Mail vvv

Safeguarding Schools Against RDP-Based Ransomware

How getting online learning right today will protect schools, and the communities they serve, for years to come.

The FBI has issued a warning to US K-12 school districts, advising them that they are being targeted by cyberthieves and should take extra precautions to secure their networks. With schools around the world responding to COVID-19 restrictions by moving to online learning, millions of students and teachers are logging on to school networks for classes and assignments. Many of them use unmanaged computers that are prone to vulnerabilities, creating countless opportunities for cybercriminals to use those devices as an attack vector to the internal network.

While the pandemic has opened new opportunities for cybercriminals, attacks on K-12 schools are nothing new. In fact, they have been on the rise for some time. The K-12 Cybersecurity Resource Center's Year in Review for 2019 reported 348 publicly disclosed "incidents" at schools, three times as many as in 2018. In 2020–2021, the FBI anticipates a major increase in attacks as schools begin to open, even as many states still struggle to contain the novel coronavirus, while others that were initially successful are battling a second wave following reopenings.

Related Content:

Don't Forget Cybersecurity on Your Back-to-School List

The Threat from the Internet—and What Your Organization Can Do About It

New on The Edge: h2c Smuggling: A New 'Devastating' Kind of HTTP Request Smuggling

Most school districts now acknowledge that things will not be back to normal this fall, and they are planning hybrid learning solutions for the school year. Hackers are delighted with this development since distance learning is often implemented using Microsoft's Remote Desktop Protocol (RDP), one of the prime targets for cybercriminals, aiming for quick gains. Their primary tactic: install ransomware that locks up data until ransoms are paid. Recently, in June 2020, the University of California San Francisco School of Medicine paid a ransom of over $1 million to regain access to important scientific data.

While a K-12 school or school district may not have data worth millions, cybercriminals know that schools often lack the resources large corporations deploy to guard against cyberattacks, which makes them prime targets. One specific attack vector the FBI has warned about is Ryuk ransomware, which is deployed via RDP endpoints, specifically students, parents, and teachers in the K-12 environment. Ryuk uses a sophisticated type of data encryption that targets backup files. Once the end user has been infected, that person can propagate the virus to the school's servers, where it can cause havoc.

"Vaccinating" Against Ransomware Infections
There are relatively simple and affordable steps to empower educational organizations providing distance learning, while keeping schools and districts safe from cyberthreats. The FBI recommends the following five steps:

Step 1: Backup your data. Make sure your backups cover your most important files.

Step 2: Secure your backups. Backups should not be connected to the computers and networks that are being backed up because anything that's connected to your network, including your backup files, can be encrypted in a ransomware attack. Also, if a good, up-to-date backup is available, there's no need to pay ransomware because all data can be quickly restored.

Step 3: Make sure that all software and operating systems are up to date and security patches are installed. It's important to make sure that all end users are updating their software, including parents, teachers, administrators, and students, in addition to software on the school's server. (Good luck with that!)

Step 4: Monitor all remote connections and software. Identify unusual activity, such as failed login attempts from any administrator-level account.

Step 5: Use two-factor authorization for login. Also apply "least privilege" controls, which allow users to access only the data and applications they need. This includes, for instance, allowing just read-only access, without the ability to alter content in any way, if students have no need to write while using a specific application.

Best Backup and Remote Access Security Practices
There are two effective ways to secure your backups from ransomware demands. The first is to use a backup that is completely offline. Why? Because if the backup is connected to the network, it likely won't help you; hackers now deploy tools that allow them to encrypt your backups as well. A disk backup may seem old-fashioned, but it's still an effective way to have a restorable backup in the event of a ransomware attack. It's also important to keep records of backups, so you can easily find the one created most recently, prior to the attack. Another advantage of storing disk backups off-site is they are available in the event of disaster such as fires or floods.

The second way to secure backups is to use cloud backup services. These services are designed with disaster recovery in mind and generally offer file versioning, which means you can restore from a backup that was done before your data was hijacked by ransomware and preserve your file structure, which makes the restore process much simpler.

Advanced Remote Access Software
Look for server-based software that is easy to control and maintain. Your IT professionals have the expertise to manage and deploy patches, but getting students, staff, and parents to update software that's installed on their devices, consistently and promptly, is a much greater challenge. The right software can be a lifesaver here. For example, some solutions are browser-based and, as a result, do not require software to be deployed on the devices themselves. Also, look for software that allows you to apply least-privilege access principles, giving different users varying levels of access (read versus write) to various applications and IT resources on servers.

Today's investment in securing online learning will also return long-term benefits. The pandemic has accelerated the digital transformation journey for many, and schools are likely to continue incorporating distance learning as an adjunct to the traditional classroom. So, getting it right today will protect schools, and the communities they serve, for years to come.

As Ericom's Group CTO of the Americas and one of the leading experts in and browser isolation, James has guided countless customers in healthcare, legal, finance, education and retail in architecting and deploying Ericom's wide range of enterprise-grade connectivity and ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
[email protected],
User Rank: Author
9/28/2020 | 2:09:04 PM
Schools need to heed the cybersecurity threat
Spot on. 

As an IT practitioner, and as a parent, I totally agree that schools need to heed this warning.  Most are ill-prepared for remote learning, and hybrid learning.   High profile attacks, along with the Pandemic can risk the school year for many kids...
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-20
This affects all versions of package lightning-server. It is possible to inject malicious JavaScript code as part of a session controller.
PUBLISHED: 2020-10-20
This affects the package @tsed/core before 5.65.7. This vulnerability relates to the deepExtend function which is used as part of the utils directory. Depending on if user input is provided, an attacker can overwrite and pollute the object prototype of a program.
PUBLISHED: 2020-10-20
This affects all versions of package osm-static-maps. User input given to the package is passed directly to a template without escaping ({{{ ... }}}). As such, it is possible for an attacker to inject arbitrary HTML/JS code and depending on the context. It will be outputted as an HTML on the page wh...
PUBLISHED: 2020-10-20
Local file inclusion vulnerability in OneThird CMS v1.96c and earlier allows a remote unauthenticated attacker to execute arbitrary code or obtain sensitive information via unspecified vectors.
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...