Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyber Insurance

Netherlands University Pays $240,000 After Targeted Ransomware Attack

University of Maastricht Pays Roughly $240,000 in Bitcoin Following Targeted Ransomware Attack

University of Maastricht Pays Roughly $240,000 in Bitcoin Following Targeted Ransomware Attack

The University of Maastricht, The Netherlands (UM), has paid a ransom of 30 Bitcoins (about $240,000 at the time, $294,000 today) for a decryption key to the CLOP ransomware. UM has been open and forthcoming on the details of the attack, providing detailed insight into a classic targeted ransomware attack.

The encryption process started on December 23, 2019. By December 29, 2019, UM had concluded that its only realistic way forward was to pay the ransom and buy the decryption key. Rebuilding the infrastructure would take months — even if it were possible — while research material would be irretrievable. In the meantime, its students would not be able to work effectively and may not be able to take their exams. 

The intrusion started on October 15th. A series of phishing emails was delivered, and two were successful on different workstations on October 15th and 16th. The attacker was resident on UM’s network for more than two months before the encryption commenced, and were able to study the topology and deliver the maximum damage.

The attacker was the group known as TA505. “The modus operandi of the group behind this specific attack,” said Fox-IT in a forensic report commissioned by UM, “comes over with a criminal group that already has a long history, and goes back to at least 2014. The group is often referred to publicly as ‘TA505’, as well as ‘GraceRAT’, named after one of the tools used by the group.”

Some subsequent media reports have linked TA505 with Evil Corps, the group behind Dridex — but this is questionable. The source appears to be a Microsoft tweet from 30 January 2020: “Dudear (aka TA505/SectorJ04/Evil Corp), used in some of the biggest malware campaigns today, is back in operations this month after a short hiatus. While we saw some changes in tactics, the revived Dudear still attempts to deploy the info-stealing Trojan GraceWire.”

Responding to this, however, Bryan Campbell, senior threat analyst with Proofpoint, commented simply, “TA505 does not equal Evil Corp.” Certainly, Fox-IT mentions neither SectorJ04 nor Evil Corp in its forensic report. Evil Corp is usually associated with the group behind Dridex. Fox-IT believes that TA505 is a separate group, but that the group has “cooperated with the ‘Dridex’ group.”

Both successful phishing emails were written in English, with links leading to an Excel document. These documents contained a macro that downloaded the SDBBot remote access trojan from IP addresses 185.225.17(.)99 and 185.212.128(.)146 respectively.

Advertisement. Scroll to continue reading.

Following the successful phishing, TA505 accessed several UM servers. One of these had not been fully patched, and the group was able to gain full rights across the infrastructure. The group surveilled the topology and was able to collect multiple account usernames and passwords. On 23 December 2019 it successfully deployed the CLOP ransomware on 267 of UM’s servers. Fox-IT found no indication that any personal or research data had been stolen, but has not been able to definitively exclude the possibility. Nevertheless, UM has now commissioned Fox-IT to conduct a separate investigation to confirm this.

The forensic firm made four primary recommendations based on its analysis of the attack: improve vulnerability and patch management, increase segmentation within the network, implement or improve network and log monitoring, and practice different crisis response scenarios.

For its part, UM has accepted the recommendations, but explains the difficulties faced by all higher education establishments: finding the right balance, it said in its own report (PDF), “between optimal digital security and providing an open and transparent environment for students and researchers.” Its conclusion is that some openness must be sacrificed to improved security in the modern cyber world.

It intends to improve security awareness training and tools for better phish detection and handling. It will improve its patch regime, but explains the problem: “UM receives approximately 100,000 updates per year, all of which have to be processed on 1,647 servers and 7,307 workstations.” It will reconsider its current segmentation, and improve its control of administrator accounts. It does already use segmentation, but acknowledges that its V-LANs “are relatively open to each other to guarantee the openness of the network and also to facilitate decentralized management and use of UM infrastructures.”

UM also intends to establish a 24/7 SIEM and SOC. This had already been planned for January 2020, but too late to affect the TA505 attack. It hopes to do this in conjunction with other universities, and hopes to emulate what is happening in Canada and is already operational in the U.S. — effectively a joint SOC between different universities for improved cooperation and collective action.

Two areas that go beyond the Fox-IT primary recommendations include the development of a configuration management database and improving its backup regime. The university acknowledges that lack of understanding of its own infrastructure hampered its response. “There were insufficient insights into the number of active and inactive computer and server systems in the UM domain.”

It also acknowledges that failure to have an offsite backup was an error. Its existing backups were primarily aimed at ensuring instant continuity, and were consequently online. “The cyber attacker was able to encrypt these online backups from a few critical systems,” it reports. “This must be prevented in the future.” Since the attack, it has now made “offline and online backups for every critical system.”

One area not mentioned by any of the parties is ‘cyber insurance‘. Since the basic education budget was established before the advent of ransomware, it may be considered currently too expensive. Nevertheless, it is something that should be considered in such a high-risk sector as higher education. There is little doubt that ransomware attacks against universities will continue, while cyber insurance already has a good track record in funding victims’ ransom payments.

Related: The Case for Cyber Insurance 

Related: The Growing Threat of Targeted Ransomware 

Related: Highly Targeted ‘Zeppelin’ Ransomware Hits Tech, Healthcare Firms 

Related: Ransomware Hits Hundreds of US Schools, Local Governments: Study

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.