University Hackers Attacked 5,000 IoT Devices on Campus

Ahead of its soon-to-be-published 2017 Data Breach Digest report, Verizon has released a sneak peek highlighting one of 16 new cybercrime case studies on new forms of threats capable of halting business operations. The preview focuses on an unnamed university that within the last year experienced a major hack into its network through more than 5,000 connected devices on campus.

In the case of “the botnet barrage,” as the case study dubbed the attack, senior members of the university’s IT staff had received complaints of slow and inaccessible network connectivity on campus. Upon examination, the incident commander found that name servers “were producing high-volume alerts and showed an abnormal number of sub-domains related to seafood,” according to the preview. The incident inspector contacted Verizon’s RISK Team, which conducted a firewall analysis that “identified more than 5,000 discrete systems making hundreds of DNS lookups every 15 minutes.”

“Of these, nearly all systems were found to be living on the segment of the network dedicated to our IT infrastructure,” the incident commander said in the preview. “This was a mess. Short of replacing every soda machine and lamp post, I was at a loss for how to remediate the situation. We had known repeatable processes and procedures for replacing infrastructure and application servers, but nothing for an IoT outbreak.”

The analysis uncovered that “the botnet spread from device to device by brute forcing default and weak passwords.” To regain control of its devices, the university used a full packet capture device to intercept the password for a compromised IoT device over the wire, and then used that to perform a password change before the next malware update took place.

Laurance Dine, managing principal of investigative response at Verizon, told ZDNet that distributed denial-of-service (DDoS) attacks by IoT botnets are going to remain a huge threat until both the manufacturers and organizations that deploy them figure out how to secure them.

“There’s going to be endless amounts of technology out there that the people are going to easily be able to get access to. DDoS is going to continue to be a big problem until we figure out how to create diversions,” she said.

About the Author

Sri Ravipati is Web producer for THE Journal and Campus Technology. She can be reached at [email protected].

Featured

  • Cyber threat vectors illuminate global map

    Cyber Espionage Campaign Exploits Claude Code Tool to Infiltrate Global Targets

    Anthropic recently reported that attackers linked to China leveraged its Claude Code AI to carry out intrusions against about 30 global organizations.

  • college students sitting with laptops at an outdoor table

    How Colleges Are Building More Connected and Responsive Student Support

    Colleges are making steady progress in building more connected and responsive student support systems. By aligning services and improving coordination, institutions are enhancing both the student and staff experience.

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.