infoguard-cyber-security-adventskalender

Advent, Advent, the school is “burning”! [Part 2]

In the first part of our three-part Advent story, we found out that Winterstadt school had fallen victim to a cyber-attack – it was the LockBit 3.0 ransomware. Last time, I asked you  why a state school could be of interest to cyber criminals at all, because as everyone knows, there are far more lucrative targets around than that. Well, have you got any ideas? In this part of the cyber Advent story, I'll tell you what happened.


At the same time as I was making contact with the attackers, my colleagues were checking the systems in the background, and they were quickly able to establish that it was very likely due to remote access being misused to access the systems. Yet again, this had not been safeguarded by means of MFA (multi-factor authentication ), making it child’s play for the attackers. It also transpired that most of the data was able to be retrieved from backups. Only the staff members’ personal drives had been irrevocably destroyed. Now you are probably asking yourself whether to pay or not to pay? The amount demanded was a six-figure sum, so paying was not really an option, especially for a school... 

The majority of the data could be recovered, so the more pressing question was what consequences of the threatened publishing of data would mean for the students and teachers. Working together with communication experts and the local police, as a precaution letters were prepared for people who might be affected, because if data is actually going to be published on the Darknet, this has to be done quickly!

Even cyber-criminals have to do their homework

Let’s go back to the attackers and the issue of why encrypting a state school seemed to be profitable for them. As it quickly became clear, the attackers had not done their homework very well, by which I mean that they calculated the ransom demand and maybe even the attack itself working on the assumption that the victim (the school) was a company with an annual turnover of 10 to 25 million Swiss francs. 

 

infoguard-x-mas-adventssory-22-t2_1

 

Of course, we did not try to withhold this fact from the attackers, and we pointed out to them that these were probably “not the droids they had been searching for”.

 

infoguard-x-mas-adventssory-22-t2_2

 

When they gave the answer “make your offer to us”, I realised that it was dawning on the blackmailers that they had probably made a mistake with this attempted blackmail. 

Do cyber criminals have a conscience?

We were just as curious as you probably are about what the blackmailers’ reaction would be. In the third and final part of our three-part cyber Advent story, you will find out how we were able to use this situation to our advantage, and whether school could continue as normal after the half-term holidays. If you don’t want to miss out on this and our Advent competition with great prizes, just subscribe to our blog updates!

Subscribe to our Blog Updates!

 

<< >>

Cyber Security , Blockchain , CSIRT

Stefan Rothenbühler
About the author / Stefan Rothenbühler

InfoGuard AG - Stefan Rothenbühler, Principal Incident Responder

More articles from Stefan Rothenbühler


Related articles
Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]
Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 2]

We‘re counting down now. It won’t be long before Father Christmas is on his way. So now it’s time for the [...]
Ransomware – a Latent Threat [Part 2]
Ransomware – a Latent Threat [Part 2]

In the first part of this blog post, Stephan Berger, Senior Cyber Security Analyst at InfoGuard CSIRT, used [...]

Exciting articles, the latest news and tips & tricks from our experts on all aspects of Cyber Security & Defence.

Blog update subscription
Social Media
infoguard-cyber-security-guide-2