{"id":80133,"date":"2016-04-18T20:50:37","date_gmt":"2016-04-19T00:50:37","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-13T16:52:31","modified_gmt":"2021-07-13T20:52:31","slug":"schools-face-ransomware-risk","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/schools-face-ransomware-risk\/","title":{"rendered":"Schools Face RansomWare Risk"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"wp-image-96787 size-medium alignleft\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-should-you-pay.jpg?resize=150%2C99&#038;ssl=1\" alt=\"\" width=\"150\" height=\"99\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-should-you-pay.jpg?resize=150%2C99&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-should-you-pay.jpg?resize=75%2C49&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-should-you-pay.jpg?w=623&amp;ssl=1 623w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/>More than 2,000 machines at <strong>K12 schools<\/strong>\u00a0are infected with a <strong>backdoor in unpatched versions of <a href=\"https:\/\/www.jboss.org\/technology\/\" target=\"_blank\" rel=\"noopener noreferrer\">JBoss<\/a><\/strong> that could be used at any moment to install <strong><a title=\"Ransomware (malware)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Ransomware_%28malware%29\" target=\"_blank\" rel=\"nofollow noopener wikipedia noreferrer\">ransomware<\/a> such as <a href=\"https:\/\/threatpost.com\/new-server-side-ransomware-hitting-hospitals\/117059\/\" target=\"_blank\" rel=\"noopener noreferrer\">Samsam<\/a><\/strong>. <em><a href=\"http:\/\/whatis.techtarget.com\/definition\/ransomware-cryptovirus-cryptotrojan-or-cryptoworm\" target=\"_blank\" rel=\"noopener noreferrer\">TargetTech<\/a><\/em> defines ransomware as\u00a0<a href=\"https:\/\/web.archive.org\/web\/20161109122112\/http:\/\/searchmidmarketsecurity.techtarget.com\/definition\/malware\">malware<\/a>\u00a0designed for\u00a0<a href=\"https:\/\/web.archive.org\/web\/20161109122112\/http:\/\/searchmidmarketsecurity.techtarget.com\/definition\/malware\">data kidnapping<\/a>, an <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/exploit\">exploit<\/a> in which the attacker <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/encryption\">encrypt<\/a>s the victim&#8217;s data and demands payment in <a href=\"https:\/\/www.bitcoin.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bitcoins<\/a> for the decryption <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/key\">key<\/a>.<\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-96789 \" title=\"JBoss\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/jboss-servers-ransomware-campaign-alert-e1562349136284-150x80.jpg?resize=137%2C73&#038;ssl=1\" alt=\"JBoss\" width=\"137\" height=\"73\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/jboss-servers-ransomware-campaign-alert-e1562349136284.jpg?resize=150%2C80&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/jboss-servers-ransomware-campaign-alert-e1562349136284.jpg?resize=75%2C40&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/jboss-servers-ransomware-campaign-alert-e1562349136284.jpg?w=284&amp;ssl=1 284w\" sizes=\"auto, (max-width: 137px) 100vw, 137px\" \/>Ransomware has typically been spread through drive-by downloads or spam emails with malicious attachments. One of the latest victims of Samsam was <a href=\"https:\/\/www.washingtonpost.com\/local\/medstar-health-turns-away-patients-one-day-after-cyberattack-on-its-computers\/2016\/03\/29\/252626ae-f5bc-11e5-a3ce-f06b5ba21f33_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">MedStar Health<\/a>, a not-for-profit organization that runs 10 hospitals in the Washington, D.C., area.<\/p>\n<p><a href=\"https:\/\/www.pcworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>PCWorld<\/em><\/a>\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/3057256\/schools-put-on-high-alert-for-jboss-ransomware-exploit.html\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that the\u00a0<strong><a href=\"http:\/\/www.cisco.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cisco<\/a><\/strong> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-CSCO\/\" target=\"_blank\" rel=\"noopener noreferrer\">CSCO<\/a>) <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/talos.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Talos<\/strong> threat-intelligence<\/a> organization, <a href=\"http:\/\/blog.talosintel.com\/2016\/04\/jboss-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer\">announced<\/a>\u00a0that roughly <strong>3.2 million machines worldwide are at risk<\/strong>. The article says that many of those already infected run <strong><a href=\"https:\/\/web.archive.org\/web\/20160519025236\/http:\/\/www.follettlearning.com:80\/webapp\/wcs\/stores\/servlet\/en\/fssmarketingstore\/library-management-system\" target=\"_blank\" rel=\"noopener noreferrer\">Follett&#8217;s Destiny library-management software<\/a><\/strong>, used by K12 schools worldwide. According to Cisco, Follett responded quickly to the vulnerability,&#8221; Follett identified the issue and immediately took actions to address and close the vulnerability&#8221;.<\/p>\n<p><a href=\"https:\/\/knowyourmeme.com\/photos\/1293153-bitcoin\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-96795 \" title=\"Bitcoin\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-1.png?resize=59%2C59&#038;ssl=1\" alt=\"Bitcoin\" width=\"59\" height=\"59\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-1.png?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-1.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/bitcoin-1.png?w=680&amp;ssl=1 680w\" sizes=\"auto, (max-width: 59px) 100vw, 59px\" \/><\/a>In a <a href=\"https:\/\/web.archive.org\/web\/20160428163940\/http:\/\/follett.com:80\/statement\/destiny-jboss\/\" target=\"_blank\" rel=\"noopener noreferrer\">presser<\/a>, Follett offers <strong>patches for systems<\/strong> running version 9.0 to 13.5 of its software and says it will help remove any backdoors. The author states that Follett technical support staff will reach out to customers found to have suspicious files on their systems. Follett even offers <strong><a title=\"Snort (software)\" href=\"http:\/\/www.snort.org\/\" target=\"_blank\" rel=\"homepage nofollow noopener noreferrer\">SNORT<\/a> detection rules<\/strong> on the presser page.<\/p>\n<p>Snort is a highly regarded <strong>open-source<\/strong>, freeware network monitoring tool that detects attack methods, including <a href=\"http:\/\/searchsoftwarequality.techtarget.com\/definition\/denial-of-service\" target=\"_blank\" rel=\"noopener noreferrer\">denial of service<\/a>, <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/buffer-overflow\" target=\"_blank\" rel=\"noopener noreferrer\">buffer overflow<\/a>, <a href=\"https:\/\/web.archive.org\/web\/20161120040834\/http:\/\/searchsoa.techtarget.com:80\/definition\/common-gateway-interface\" target=\"_blank\" rel=\"noopener noreferrer\">CGI<\/a> attacks, <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/stealth\" target=\"_blank\" rel=\"noopener noreferrer\">stealth<\/a> <a href=\"http:\/\/searchnetworking.techtarget.com\/definition\/port\">port<\/a>\u00a0scans, and SMB <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/probe\" target=\"_blank\" rel=\"noopener noreferrer\">probe<\/a>s. When suspicious behavior is detected, Snort sends a real-time alert to <i>Syslog<\/i>, a separate &#8216;alerts&#8217; file, or to a <a href=\"http:\/\/whatis.techtarget.com\/definition\/pop-up\" target=\"_blank\" rel=\"noopener noreferrer\">pop-up<\/a>\u00a0window.<\/p>\n<p><strong><a href=\"https:\/\/www.jboss.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">JBoss<\/a><\/strong> the vulnerable underlying system is <a href=\"https:\/\/www.webopedia.com\/TERM\/J\/JBOSS.html\" target=\"_blank\" rel=\"noopener noreferrer\">described<\/a> as an open-source <strong><a href=\"https:\/\/www.redhat.com\/en\" target=\"_blank\" rel=\"noopener noreferrer\">Red Hat<\/a><\/strong> product that serves as an <a href=\"https:\/\/www.webopedia.com\/TERM\/A\/application_server.html\">application server<\/a> written in <strong><a href=\"https:\/\/www.webopedia.com\/TERM\/J\/Java.html\">Java<\/a><\/strong> that can host business components developed in Java. Essentially, JBOSS is an <a href=\"https:\/\/www.webopedia.com\/TERM\/O\/open_source.html\">open source<\/a> implementation of <a href=\"https:\/\/www.webopedia.com\/TERM\/J\/J2EE.html\">J2EE<\/a> that relies on the <a href=\"https:\/\/web.archive.org\/web\/20201029084048\/https:\/\/www.webopedia.com\/TERM\/E\/Enterprise_JavaBeans.html\">Enterprise JavaBeans<\/a> specification for functionality.<\/p>\n<p><em>PCWorld<\/em> reports that compromised JBoss servers typically contain more than one Web shell. Talos advises that it is important to check the contents of a <strong>server&#8217;s jobs status page<\/strong>. &#8220;This implies that many of these systems have been compromised several times by different actors,&#8221; the company said.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160227111425\/http:\/\/desccomputers.com\/backup.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-96792 \" title=\"Backup\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/backup.jpg?resize=174%2C58&#038;ssl=1\" alt=\"Backup\" width=\"174\" height=\"58\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/backup.jpg?resize=150%2C50&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/backup.jpg?resize=75%2C25&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/backup.jpg?w=600&amp;ssl=1 600w\" sizes=\"auto, (max-width: 174px) 100vw, 174px\" \/><\/a>Web shells are scripts that indicate an attacker has already compromised a server and can remotely control it. The list of those associated with this exploit is listed in Talos&#8217;s <a href=\"http:\/\/blog.talosintel.com\/2016\/04\/jboss-backdoor.html\" target=\"_blank\" rel=\"noopener noreferrer\">blog post<\/a>.<\/p>\n<p>Companies that find a Web shell installed should begin by removing external access to the server, Talos said in the article. The security firm recommends quick action.<\/p>\n<p style=\"padding-left: 30px; text-align: justify;\"><em>Ideally, you would also re-image the system and install updated versions of the software &#8230; If for some reason you are unable to rebuild completely, the next best option would be to restore from a backup prior to the compromise and then upgrade the server to a non-vulnerable version before returning it to production.<\/em><\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>I have worked with a number of customers on their library\u00a0automation projects. The cost of these systems is as usual in the data. There is a great deal of time and effort that goes into creating the proper <a href=\"https:\/\/www.loc.gov\/marc\/umb\/\" target=\"_blank\" rel=\"noopener noreferrer\">MARC records<\/a>, especially for books that are out of print and kiddie books. If these files get locked up by ransomware, the system is useless and expensive to replace.<\/em><\/p>\n<p><em>K12 schools are notoriously cheap, but the advice is the same as always,<\/em><\/p>\n<ol>\n<li><em><strong>Keep your software UP TO DATE<\/strong><\/em><\/li>\n<li><em>Use a real <strong>virus scanner<\/strong> on your servers and administrative stations<\/em><\/li>\n<li><em><strong>Back-Up &#8211; Back-Up &#8211; Back-Up<\/strong> &#8211;\u00a0With a good backup, you can just blow the machine away, re-install and restore the data. and be back in business.<\/em><\/li>\n<\/ol>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/web.archive.org\/web\/20200922114105\/https:\/\/www.newsbtc.com\/2016\/03\/25\/whats-first-bitcoin-ransomware\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">What Came First, Bitcoin or Ransomware?<\/a> (newsbtc.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Schools using old Follett software at risk of losing data to ransomware<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2686,857,247,487,2662,177,2661,128,2663,23,512,1507,2366,4,2664,2665],"class_list":["post-80133","post","type-post","status-publish","format-standard","hentry","category-security","tag-2686","tag-bitcoin","tag-cisco","tag-csco","tag-follett","tag-java","tag-jboss","tag-k12","tag-library","tag-malware","tag-open-source","tag-ransomware","tag-red-hat","tag-security","tag-snort","tag-talos"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80133","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=80133"}],"version-history":[{"count":21,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80133\/revisions"}],"predecessor-version":[{"id":132093,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/80133\/revisions\/132093"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=80133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=80133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=80133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}