Cryptojacking Targets Education

Education is among one of the top verticals affected by a newer form of nefarious cybercrime. Malicious cryptomining or cryptojacking, as it's called, describes the theft of computer processing resources — electricity, cloud services and other digital assets — that are then exploited to do cryptocurrency mining without the owner's permission or knowledge, according to a recent report by Cisco.

According to the company, unauthorized cryptomining activity grew 19 times, increasing from 600,000 queries in March to 11.3 million by December. The impact is felt by its victim companies through degraded performance, systems attacks and higher electricity usage, as well as possible compliance problems, particularly in the area of security exchange regulations.

While the largest target was made up of energy and utility companies, in the Cisco study, colleges experienced 22 percent of all cryptomining attempts, while K-12 made up 4 percent of the total. Cisco, which sells Umbrella, an enterprise cloud security service intended to stop users from connecting to malicious sites, said those organizations with fewer than 10,000 employees were the primary focus, making up eight in 10 of the targets hit by cryptomining traffic.

Next week, two people from Cisco, Ayse Kaya Firat, the head of analytics and customer insights, and Austin McBride, a threat analytics researcher, will be presenting a session on the topic during the RSA security conference.

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • magnifying glass revealing the letters AI

    New Tool Tracks Unauthorized AI Usage Across Organizations

    DevOps platform provider JFrog is taking aim at a growing challenge for enterprises: users deploying AI tools without IT approval.