Feds Warn of Risks to Sensitive Data on University Servers

 

The United States Department of Homeland Security is warning universities that their information-filled IT infrastructures might give hackers access to sensitive federal networks.

Intruders hijacked a university's supercomputer in early 2014, leveraging its vast capabilities in a massive electronic assault on U.S. gaming networks, according to a recent warning to American higher education from the Department of Homeland Security.

DHS's “unclassified, for official use only” memo said university networks are attractive targets for cybercriminals, adding that universities' networks can provide access to other types of electronic facilities, including sensitive federal networks.

The Jan. 16 memo was linked in a Jan. 21 news story on the University of Nebraska-Omaha's Maverick Daily newspaper.

In early 2014,  an unidentified cyber actor leveraged a supercomputer at a U.S. university to initiate a denial of service attack against the servers of several businesses that host servers for gaming activities, said the DHS memo, quoting an FBI source. The attack used about 98 percent of the university’s bandwidth. DHS didn't name the university in the memo.

Hacker Group Lizard Squad has claimed responsibility for bringing down MicroSoft's Xbox and Sony's PlayStation gaming networks in a later attack on Christmas Day 2014. The group had also been implicated in earlier attacks on those gaming networks. Soon after the Christmas Day Xbox and PlayStation network attacks, members of the loosely knit group told various media outlets around the world that that their DoS attacks tracked through undersea routers and overwhelmed networks with massive transmissions of more than a terabit per second.

Along with the supercomputer report, the memo also said government-funded advanced research programs, sensitive U.S. government and cleared contractor projects linked with higher education facilities, "are appealing targets for cyber actors looking to gain access to sensitive research programs and information."

University networks offer an alternative point of access to sensitive information for cyber spies, according to DHS. "University networks, which often have multiple levels of connectivity and accessibility to fuel collaboration, may present an easier target for cyber espionage actors than sensitive government or private industry networks."

Despite the ominous words, DHS said run-of-the-mill cybercriminals were primarily interested in university networks to perpetrate typical cybercrimes like phishing scams, ransomware, shenanigans with student finances and other less spectacular electronic crimes. Cybercriminals can also camp out on university networks, using them as a base for attacks elsewhere, said the memo, because the constant ebb and flow of students using the networks can mask the criminals and their activities.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at [email protected] or follow him on Twitter at @MRockwell4.


Featured

  • Three cubes of noticeably increasing sizes are arranged in a straight row on a subtle abstract background

    A Sense of Scale

    Gardner Campbell explores the notion of scale in education and shares some of his own experience "playing with scale" — scaling up and/or scaling down — in an English course at VCU.

  • AI-inspired background pattern with geometric shapes and fine lines in muted blue and gray on a dark background

    IBM Releases Granite 3.0 Family of Advanced AI Models

    IBM has introduced its most advanced family of AI models to date, Granite 3.0, at its annual TechXchange event. The new models were developed to provide a combination of performance, flexibility, and autonomy that outperforms or matches similarly sized models from leading providers on a range of benchmarks.

  • minimalist bookcase filled with textbooks featuring vibrant, solid-colored spines with no text, and a prominent number "25" displayed on one of the shelves

    OpenStax Celebrates 25th Anniversary

    OpenStax is celebrating its 25th anniversary as 2024 comes to a close. The open educational resources initiative from Rice University has served almost 37 million students in 153 countries and saved students nearly $3 billion in course material costs since its launch in 1999.

  • a professional worker in business casual attire interacting with a large screen displaying a generative AI interface in a modern office

    Study: Generative AI Could Inhibit Critical Thinking

    A new study on how knowledge workers engage in critical thinking found that workers with higher confidence in generative AI technology tend to employ less critical thinking to AI-generated outputs than workers with higher confidence in personal skills.