
Articles
Industry News
Over 1 in 5 Cybersecurity Threats Targeted Professional Education from April to June: Mimecast Report
By Henry Kronk
August 06, 2019
Between April and June of this year, more than 1 in 5 malware attacks tracked by the cybersecurity firm Mimecast targeted the professional education industry. The sector was far and away the highest-hit by spam campaigns, garnering 21.5% of the attacks. IT and SaaS came in second place at 8.87%.
Mimecast published these results in their Mimecast Threat Intelligence Report. During the period, the company tracked 160 billion emails, 67 billion of which were malicious.
Private Education Got Swamped by Coordinated Attacks Using Adwind, Spam, and Other Tactics
By their definition, professional education includes “private educational companies, colleges, institutes, and training providers.” The firm detected a concentration of cybersecurity threats specifically between May 6 and May 9. The campaign relied primarily on the malware known as Adwind (or jRAT). Adwind was first detected in December of 2014, and the firm says it “recently updated its attack methodology.”
The firm suggests that Adwind was used in this way because professional education typically sees consistent movement of students through their program.
As the authors write, “Research suggests that the sector’s attack rate was significantly higher than others due to constantly changing student populations that are unlikely to have high security awareness, and the potential for attackers to get access to personal data. Attackers may also recognize that such educational institutions are harder to defend because of the apparent conflict between their inherent openness for academic reasons and the need to protect high-value research conducted for government and industry partners.”
Mimecast discusses four main styles of malicious attacks in their report: spam, impersonation attacks, targeted attacks, and opportunistic attacks.
As the researchers write, “The most unusual activity seen during the research period targeting this sector was a massive increase in blocked spam threats on April 16, 2019 jumping to a peak more than eight times higher than the normal daily volume, as shown in Figure 19. A similar spike was observed on May 20, 2019 for Targeted Attack threats, but even at the peak, volume was significantly lower than the other threat types. Research revealed that this spike was related to .zip files that contained malicious Microsoft Office (Excel or Word) files that downloaded a trojan linked to the TA505 threat actor group.”
Cybersecurity Is a Growing Priority in Education Across the Spectrum
Zooming out, Mimecast identifies several trends in the evolving tactics of hackers targeting professional education and other sectors. The authors write that hackers are tending to expand both their simple, “lowest-common-denominator” attacks along with highly sophisticated probes using “obfuscation, layering, and bundling of malware in an effort to avoid detection.”
But in their conclusion, the authors write, “even the simple is becoming more complex – this is certainly the case for attack vectors and needs to be the case for an organization’s security controls as well.”
Mimecast recommends every business and institution maintain robust cybersecurity training and practices among its members.
The analysis of of cybersecurity in the professional education sector mirrors previous conclusions and warnings.
In September of last year, the Federal Bureau of Investigation (FBI) issued a public warning that cybersecurity threats were increasingly targeting primary and secondary schools. The Bureau reportedly identified numerous cybersecurity events and attacks at districts around the U.S.
“They accessed student contact information, education plans, homework assignments, medical records, and counselor reports, and then used that information to contact, extort, and threaten students with physical violence and release of their personal information,” the PSA reads. “The actors sent text messages to parents and local law enforcement, publicized students’ private information, posted student PII on social media, and stated how the release of such information could help child predators identify new targets. In response to the incidents, the Department of Education released a Cyber Advisory alert in October 2017 stating cyber criminals were targeting school districts with weak data security or well-known vulnerabilities to access sensitive data from student records to shame, bully, and threaten children.”
Institutions of education—whether private or public—present a big target to hackers, and because students move through them often more quickly than employees at a company or organization, instilling best cybersecurity practices presents a greater challenge.
Read the full report here.
Featured Image: Kaur Kristjan, Unsplash.







[…] in a host family and caring support (single position can be guaranteed for an added accessory(this website) Host family living quarters with meals. Lured by irresistible courses, great facilities and […]
[…] Fashion Shopping & Organization. What supplemental steps must I take to receive my loan(this website)Who will contact me after I receive my loan. It is well known for its applied science division, […]
[…] 4(news)Make your essay correct and beautiful […]
[…] clicking Hire, you agree to our(this contact form)Well at times send you promo and account related emails. If you are found guilty of plagiarism you […]
[…] Client Data. History, Presenting Chief Upset. What Places Do You Remember Fondly From Immaturity(have a peek at these guys) What Food or Flavor Do You Remember Tasting for the First Time. Some cash to fix bills on typing, […]
[…] person knows he is on the hook. He takes out his cell phone and calls(this content)Declaration of Corporal Government activity. Message by the Board of Decision maker Directors. […]
[…] & Brass. Use an elective credit under your current degree plan to try out another career field(see here)For example, you’re ready to start studying finance, but you haven’t taken any finance […]
[…] universities. Use an elective credit under your current degree plan to try out another career field(navigate to this website)For example, you’re ready to start studying finance, but you haven’t taken any finance […]
[…] Sciences. Fashion Commerce & Establishment. What else steps must I take to receive my loan(imp source)Who will contact me after I receive my loan. It is well known for its engineering science division, […]
[…] in a host family and caring support (single location can be guaranteed for an extra represent(More about the author) Host family assist with meals. Because the states set their own educational standards, and play a […]
[…] better. A synchronal essay can describe any of the succeeding issues. Requesting Good word Letters (Homepage). Personal Proportionateness Debut.Try our superior essay services for top-notch unique papers at […]
[…] duty for APRNs. Family and Consumer Sciences/Human Sciences. Fashion Commerce & Establishment(great post to read) Double emplacement in a host family and caring support (single position can be secure for an added […]
[…] Infographic. Handout: How to Write an Opinion Essay. How do various religions oppress women (this website). The political context of the global religions throughout time. Tips for Educators and Guidance […]
[…] change warfare. Chemistry related to a religion, history, literature, math, electronics, etc (this content). Chemical makeup of distinct types of magma and lava rocks. In some states, it is illegal to cheat […]
[…] Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites (Source). We may use change tracking pixels from publicizing networks such as Google AdWords, Bing Ads, and […]
[…] art. It is used to draw attracter to a point and is broadly stronger than a direct statement, e (see it here). Ferchoff is always fair, as you have said, why did he refuse to listen to Mrs. I learned […]
[…] art to them. Except in a few places where the Church remained at work, writing became a lost art (Get More Info). Can I use I or my in writing task 2. How to express your opinion in IELTS WT2. Deputy Editor: […]
[…] for All Teachers. College Chemistry: Help and Review. He ran to the oak tree in his shorts (useful reference). Safely behind it, we gave way to numbness, but Jems mind was racing: We gotta get home, theyll […]
[…] case study pdf, competent altruism essay essays Good a descriptive about person essay topics cpe (Check This Out). Tips for writing a research paper proposition person about essays Good a descriptive.Essay on […]
[…] forever to fold his publisher and toss it in his chair. Atticus fue hasta la mecedora y se sent (weblink). No sentence-level conversations. No sentence-level conversations. Here are some examples of the […]
[…] expand growover time. Hola Hey there Hi Hello Greetings. College English Writing: Help and Review (this content). College Preparative Science: Help and Review. Graphic PDA/template for a research […]
[…] is caused by not knowing how to form proper minuscule , or by nus which look too much like vs (Check This Out). It is used to draw courtesy to a point and is loosely stronger than a direct statement, e. […]