Cryptojacking Targets Education

Education is among one of the top verticals affected by a newer form of nefarious cybercrime. Malicious cryptomining or cryptojacking, as it's called, describes the theft of computer processing resources — electricity, cloud services and other digital assets — that are then exploited to do cryptocurrency mining without the owner's permission or knowledge, according to a recent report by Cisco.

According to the company, unauthorized cryptomining activity grew 19 times, increasing from 600,000 queries in March to 11.3 million by December. The impact is felt by its victim companies through degraded performance, systems attacks and higher electricity usage, as well as possible compliance problems, particularly in the area of security exchange regulations.

While the largest target was made up of energy and utility companies, in the Cisco study, colleges experienced 22 percent of all cryptomining attempts, while K-12 made up 4 percent of the total. Cisco, which sells Umbrella, an enterprise cloud security service intended to stop users from connecting to malicious sites, said those organizations with fewer than 10,000 employees were the primary focus, making up eight in 10 of the targets hit by cryptomining traffic.

Next week, two people from Cisco, Ayse Kaya Firat, the head of analytics and customer insights, and Austin McBride, a threat analytics researcher, will be presenting a session on the topic during the RSA security conference.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • interconnected cloud icons with glowing lines on a gradient blue backdrop

    Report: Cloud Certifications Bring Biggest Salary Payoff

    It pays to be conversant in cloud, according to a new study from Skillsoft The company's annual IT skills and salary survey report found that the top three certifications resulting in the highest payoffs salarywise are for skills in the cloud, specifically related to Amazon Web Services (AWS), Google Cloud, and Nutanix.

  • a hobbyist in casual clothes holds a hammer and a toolbox, building a DIY structure that symbolizes an AI model

    Ditch the DIY Approach to AI on Campus

    Institutions that do not adopt AI will quickly fall behind. The question is, how can colleges and universities do this systematically, securely, cost-effectively, and efficiently?

  • minimalist geometric grid pattern of blue, gray, and white squares and rectangles

    Windows Server 2025 Release Offers Cloud, Security, and AI Capabilities

    Microsoft has announced the general availability of Windows Server 2025. The release will enable organizations to deploy applications on-premises, in hybrid setups, or fully in the cloud, the company said.

  • digital brain made of blue circuitry on the left and a shield with a glowing lock on the right, set against a dark background with fading binary code

    AI Dominates Key Technologies and Practices in Cybersecurity and Privacy

    AI governance, AI-enabled workforce expansion, and AI-supported cybersecurity training are three of the six key technologies and practices anticipated to have a significant impact on the future of cybersecurity and privacy in higher education, according to the latest Cybersecurity and Privacy edition of the Educause Horizon Report.