{"id":60434,"date":"2014-01-30T22:22:58","date_gmt":"2014-01-31T03:22:58","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-26T13:02:58","modified_gmt":"2021-08-26T17:02:58","slug":"cyber-attacks-on-schools","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/cyber-attacks-on-schools\/","title":{"rendered":"Cyber Attacks on Schools"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20161107083847\/http:\/\/stellaredgeindustrialtraining.com:80\/w\/technologies\/cloud-computing\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107760\" title=\"Cyber Attacks on Schools\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cloud_computing1-3.png?resize=90%2C63&#038;ssl=1\" alt=\"Cyber Attacks on Schools\" width=\"90\" height=\"63\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cloud_computing1-3.png?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/Cloud_computing1-3.png?w=150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a><strong>Cloud services<\/strong> and data-management systems are multiplying in the edu market. Schools, districts, and states are using <strong>online networks to store student data<\/strong> such as records <strong>PII, medical records<\/strong>, attendance, and grades. Putting all of this data online is scary enough, these systems are designed to allow parents (<em>and attackers<\/em>) to get to data from a home PC.<\/p>\n<h3>More convenient for teachers and parents<\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20150330064132\/http:\/\/eu.montana.edu:80\/online\/top\/shortcourse\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107762\" title=\"vulnerable to cyber attacks\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/laptop_books-1.jpg?resize=89%2C55&#038;ssl=1\" alt=\"vulnerable to cyber attacks\" width=\"89\" height=\"55\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/laptop_books-1.jpg?resize=75%2C46&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/laptop_books-1.jpg?resize=150%2C92&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/laptop_books-1.jpg?w=265&amp;ssl=1 265w\" sizes=\"auto, (max-width: 89px) 100vw, 89px\" \/><\/a><a title=\"Education Week\" href=\"http:\/\/blogs.edweek.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Education Week<\/em><\/a> <a title=\"Cyber Attacks on School Networks Increasing\" href=\"http:\/\/blogs.edweek.org\/edweek\/DigitalEducation\/2013\/09\/cyber_attacks_on_school_networ.html\" target=\"_blank\" rel=\"noopener noreferrer\">explains<\/a> that the switch to online data is often more convenient for teachers and parents. But these changes can also make state agencies, districts, and schools <strong>vulnerable to cyber attacks<\/strong>. The author cites the August 2013 <a title=\"distributed denial-of-service attack (DDoS)\" href=\"http:\/\/searchsecurity.techtarget.com\/definition\/distributed-denial-of-service-attack\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS<\/a> attack on the <a href=\"http:\/\/education.ky.gov\/Pages\/default.aspx\">Kentucky Department of Education&#8217;s<\/a> statewide\u00a0<a href=\"http:\/\/www.infinitecampus.com\/\">Infinite Campus<\/a> information network as a precursor of things to come. The <a title=\"Kentucky\" href=\"http:\/\/maps.google.com\/maps?ll=37.5,-85.0&amp;spn=3.0,3.0&amp;q=37.5,-85.0 (Kentucky)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Kentucky<\/a> agency was able to fight off the DDoS attack before any data was compromised but <strong>school DDoS attacks<\/strong> are occurring more often as they get easier to execute. David Couch the Kentucky Department of Education&#8217;s chief information officer said.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>What I understand from what I&#8217;ve seen is that [DDoS attacks <\/em><em>are] a <\/em><em>commonality now &#8230; I think most organizations have to add to their tool suite a w<\/em><em>ay to detect them.<\/em><\/p>\n<h3>Online attacks<\/h3>\n<p><em> <a href=\"http:\/\/www.cdnetworks.com\/blog\/ddos-mitigation-engaging-a-distributed-network-vs-installing-hardware\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107764\" title=\"DDoS attack\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/DDoS-image.gif?resize=90%2C90&#038;ssl=1\" alt=\"DDoS attack\" width=\"90\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/DDoS-image.gif?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/DDoS-image.gif?resize=150%2C150&amp;ssl=1 150w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a><a title=\"GCN\" href=\"http:\/\/gcn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GCN<\/a><\/em> <a title=\"Education services provider draws fire from DDoS attacker \" href=\"https:\/\/web.archive.org\/web\/20211019183832\/https:\/\/gcn.com\/articles\/2013\/10\/22\/ddos-attacks.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> another edu <strong>DDoS attack. <\/strong>This one is on <a href=\"https:\/\/oncoursesystems.com\" target=\"_blank\" rel=\"noopener noreferrer\">OnCourse Systems for<\/a> Education a <strong>SaaS<\/strong> that provides software services to K-12 schools. The firm became the victim of <strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/UDP_flood_attack\" target=\"_blank\" rel=\"noopener noreferrer\">UDP flood<\/a><\/strong> from Germany and the Netherlands. The firm tried to fly under the radar, Mark Yelcick, chief technology officer and partner at OnCourse said.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>This was the first DDoS attack at OnCourse, and we never thought that we would be a target &#8230; There\u2019s no money or assets to be gained by attacking an SaaS provider of K-12 educational systems. We felt that the firewall, intrusion protection and DDoS protection from our data center provider would be enough.<\/em><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107766\" title=\"DDoS mitigation platform\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_sheild-1.png?resize=90%2C76&#038;ssl=1\" alt=\"DDoS mitigation platform\" width=\"90\" height=\"76\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_sheild-1.png?resize=75%2C63&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_sheild-1.png?resize=150%2C127&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/security_sheild-1.png?w=281&amp;ssl=1 281w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/>In order to turn back the tide of rouge packets, OnCourse brought in <a href=\"http:\/\/www.prolexic.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">P<\/a><a href=\"http:\/\/www.prolexic.com\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">rolexic<\/a>. Prolexic\u00a0has solutions tailored for the education market. The company engaged its emergency services, routing traffic through Prolexic\u2019s <strong>1.5 Tbps cloud-based DDoS mitigation platform<\/strong> and stopping the attacks. CTO Yelcick said, &#8220;<em>We simply cannot afford downtime brought about by a DDoS attack.\u201d<\/em><\/p>\n<p>Because DDoS attacks can target any IP address, it&#8217;s impossible to completely prevent them, so for districts and the companies that offer data management services, the focus is on battling these attacks as they come.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20140128141038\/http:\/\/www.freepik.com:80\/free-vector\/crashing-wave-clip-art_383615.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107768\" title=\"battling these attacks as they come\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crashing-wave.jpg?resize=106%2C38&#038;ssl=1\" alt=\"battling these attacks as they come\" width=\"106\" height=\"38\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crashing-wave.jpg?resize=75%2C27&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crashing-wave.jpg?resize=150%2C54&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/crashing-wave.jpg?w=626&amp;ssl=1 626w\" sizes=\"auto, (max-width: 106px) 100vw, 106px\" \/><\/a>&#8220;<em>We have to be prepared and understand the environment that we are operating in so we&#8217;re prepared to address these issues as they come up<\/em>,&#8221; says Infinite Campus CEO Eric Creighton, the victim of the Kentucky DDoS attack.<\/p>\n<h3>Attackers are after student PII<\/h3>\n<p>Part of predicting and combating cyber attacks is understanding why people order these attacks in the first place. When the target is a network that stores student grades and attendance information, the immediate thought is that a student is responsible. However, Mr. Creighton says that students rarely attempt attacks and, in his experience, have never succeeded.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20181026012748\/http:\/\/www.theparentbackpack.com:80\/talking-about-bad-grades-2\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107757\" title=\"Report card\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kid-reading-report-card-1.jpg?resize=90%2C66&#038;ssl=1\" alt=\"Report card\" width=\"90\" height=\"66\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kid-reading-report-card-1.jpg?resize=75%2C55&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kid-reading-report-card-1.jpg?resize=150%2C110&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/kid-reading-report-card-1.jpg?w=262&amp;ssl=1 262w\" sizes=\"auto, (max-width: 90px) 100vw, 90px\" \/><\/a><em>&#8220;I don&#8217;t think these are attacks attempting to get data &#8230; There&#8217;s no jackpot of <\/em><em>valuable data &#8211;there&#8217;s no payload here.&#8221;<\/em> CEO Creighton may be spinning the results. <em><strong>rb-<\/strong> I wrote about schools collecting and losing PII <a title=\"School Kids\u2019 Data at Risk\" href=\"http:\/\/wp.me\/p2wgaW-3I2\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n<p>One reason that <strong>schools and districts are<\/strong> targeted is that their systems are <strong>designed for convenient<\/strong> access. Easy access for parents and teachers, <strong>makes for easier targets<\/strong>. Marcus Rogers, a professor, and chair of the cyber forensics program at <a title=\"Purdue University\" href=\"http:\/\/maps.google.com\/maps?ll=40.424,-86.929&amp;spn=1.0,1.0&amp;q=40.424,-86.929 (Purdue%20University)&amp;t=h\" target=\"_blank\" rel=\"geolocation noopener noreferrer\">Purdue University<\/a> told <em>Education Week.<\/em><\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>For a lot of these attacks, the intended victim or goal is something bigger than the school. Obviously schools want to protect their data, but the bigger threat is when they use those networks now to go out and attack a power plant or a stock exchange or an air traffic control systems. That&#8217;s when the stakes go up.<\/em><\/p>\n<h3>Caused by a BYOD device<\/h3>\n<p>Kentucky education officials believe that the attack on their systems was triggered by a beacon. They hypothesize that a beacon was unknowingly placed on a student&#8217;s mobile device, which he or she took with them to school. Viruses can cause a device to send out a beacon, instructing thousands of other devices to attack the network the device is connected to. In Kentucky, officials say that this won&#8217;t stop individual districts from implementing <strong>bring-your-own-device<\/strong> programs. However, schools can decrease the chances of an attack by making sure that these student devices are properly protected according to <em>Education Week. <\/em>CIO Couch believes schools will start to protect themselves.<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>I think what you&#8217;re going to see is districts making sure that before people plug into their network they have up-to-date, good virus protection &#8230; I think you&#8217;ll start to see that in K-12.&#8221;<\/em><\/p>\n<p>Purdue&#8217;s Rogers says that even when schools know <strong>best practices<\/strong> for avoiding and combating attacks, such measures are often <strong>cost-prohibitive<\/strong>.<em> &#8220;A lot of times the schools know what to do, but at the end of the day if they&#8217;re trying to get library books, a firewall is not going to be their big concern.&#8221;<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20200805141311\/https:\/\/pando.com\/2014\/01\/29\/ddos-as-a-distraction-the-one-two-cyberpunch\/\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS as a distraction: The one-two cyberpunch<\/a> (pando.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber attackers are targeting K-12 schools networks with DDOS attacksto steal PII or as a launching point for bigger attacks,<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,173,1748,768,128,2057,1031,4,1030],"class_list":["post-60434","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-cloud-computing","tag-ddos","tag-denial-of-service-attack","tag-k12","tag-kentucky","tag-saas","tag-security","tag-software-as-a-service"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/60434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=60434"}],"version-history":[{"count":12,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/60434\/revisions"}],"predecessor-version":[{"id":131185,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/60434\/revisions\/131185"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=60434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=60434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=60434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}