www.rivitmedia.comwww.rivitmedia.comwww.rivitmedia.com
  • Home
  • Tech News
    Tech NewsShow More
    Microsoft’s May 2025 Patch Tuesday: Five Actively Exploited Zero-Day Vulnerabilities Addressed
    7 Min Read
    Malicious Go Modules Unleash Disk-Wiping Chaos in Linux Supply Chain Attack
    4 Min Read
    Agentic AI: Transforming Cybersecurity in 2025
    3 Min Read
    Cybersecurity CEO Accused of Planting Malware in Hospital Systems: A Breach of Trust That Shocks the Industry
    6 Min Read
    Cloud Convenience, Criminal Opportunity: How Google Sites Became a Launchpad for Elite Phishing
    6 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • FREE SCAN
  • Cybersecurity for Business
  • en English▼
    af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 rivitMedia.com. All Rights Reserved.
Reading: Back-to-School Season Disrupted by Ransomware, Zoom Bombing & Other Cyber Intrusions
Share
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Notification Show More
Font ResizerAa
www.rivitmedia.comwww.rivitmedia.com
en English▼
af Afrikaanssq Shqipam አማርኛar العربيةhy Հայերենaz Azərbaycan dilieu Euskarabe Беларуская моваbn বাংলাbs Bosanskibg Българскиca Catalàceb Cebuanony Chichewazh-CN 简体中文zh-TW 繁體中文co Corsuhr Hrvatskics Čeština‎da Dansknl Nederlandsen Englisheo Esperantoet Eestitl Filipinofi Suomifr Françaisfy Fryskgl Galegoka ქართულიde Deutschel Ελληνικάgu ગુજરાતીht Kreyol ayisyenha Harshen Hausahaw Ōlelo Hawaiʻiiw עִבְרִיתhi हिन्दीhmn Hmonghu Magyaris Íslenskaig Igboid Bahasa Indonesiaga Gaeilgeit Italianoja 日本語jw Basa Jawakn ಕನ್ನಡkk Қазақ тіліkm ភាសាខ្មែរko 한국어ku كوردی‎ky Кыргызчаlo ພາສາລາວla Latinlv Latviešu valodalt Lietuvių kalbalb Lëtzebuergeschmk Македонски јазикmg Malagasyms Bahasa Melayuml മലയാളംmt Maltesemi Te Reo Māorimr मराठीmn Монголmy ဗမာစာne नेपालीno Norsk bokmålps پښتوfa فارسیpl Polskipt Portuguêspa ਪੰਜਾਬੀro Românăru Русскийsm Samoangd Gàidhligsr Српски језикst Sesothosn Shonasd سنڌيsi සිංහලsk Slovenčinasl Slovenščinaso Afsoomaalies Españolsu Basa Sundasw Kiswahilisv Svenskatg Тоҷикӣta தமிழ்te తెలుగుth ไทยtr Türkçeuk Українськаur اردوuz O‘zbekchavi Tiếng Việtcy Cymraegxh isiXhosayi יידישyo Yorùbázu Zulu
Font ResizerAa
  • Online Scams
  • Tech News
  • Cyber Threats
  • Mac Malware
  • Cybersecurity for Business
  • FREE SCAN
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How-To-Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    • Cybersecurity for Business
  • FREE SCAN
  • Sitemap
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
www.rivitmedia.com > Blog > Cyber Threats > Ransomware > Back-to-School Season Disrupted by Ransomware, Zoom Bombing & Other Cyber Intrusions
IT/Cybersecurity Best PracticesRansomwareTech News

Back-to-School Season Disrupted by Ransomware, Zoom Bombing & Other Cyber Intrusions

riviTMedia Research
Last updated: October 23, 2023 6:52 pm
riviTMedia Research
Share
Back-to-School Season Disrupted by Ransomware, Zoom Bombing & Other Cyber Intrusions
SHARE

As a result of Cyberattacks, several school systems have had to delay the new school year. In September of 2020, attacks in Hartford, Conn. and Clark County, Nev. forced postponements, and security experts say that this is just the beginning as more students head back to the classroom.

Contents
What is Zoom-Bombing?What Are Some Other Back to School and Back to Work Scams?How Can You Secure Your Virtual Learning or Remote Working EnvironmentBackup Your DataImplement a Strong Identity Management StrategyAutomationScan and Wipe

Hartford’s ransomware attack caused an outage of several systems, including the software that delivers real-time information on bus routes. That led school leaders to delay the first day of classes.

According to Heather Paunet, senior vice president of product management at Untangle, “In 2020, schools are facing more complex cyber-threats as the need for data, monitoring and contact tracing become key factors in students returning to in-person classes.” 

“The other side of the coin is that many schools are beginning the year remotely, meaning that students will have longer periods of time where they are connected to the internet, and being a possible point of access. Managing student data and network access will be essential in both cases.”

Global cybersecurity software provider Armor has also identified 17 U.S. school districts and colleges that encompass 284 schools that have been victimized by ransomware between January 1st and April 8th of 2020. Of the 17 school districts victimized, 15 have not disclosed whether they paid the ransom, while two refused to pay. Four of the schools reported the strain of ransomware used to attack them. The malware strains involved included Sodinokibi, Ryuk and Maze ransomware.

These attacks are not limited to schools. Municipalities, healthcare organizations, managed service providers and cloud-based service providers have also been victimized.

What is Zoom-Bombing?

In addition to ransomware, schools and students now face several threats as students return to learning during the global Coronavirus pandemic. One of the more prevalent threats is Zoom-bombing, a trend that began early in 2020 as coronavirus lockdowns led to a massive spike in the use of videoconferencing software. These attacks consist of a hacker gaining access to the dial-in information and “crashing” a Zoom session – often sharing adult-themed or otherwise disturbing media.

In one case, a 14-year-old boy from Park Ridge, Ill. was accused of sharing login information for remote classes at a high school, which resulted in Zoom-bombers hijacking remote classes during the first week of school from August 25th through August 27th. In another case, a man was arrested after Zoom-bombing an online lecture conducted by the University of Houston and making bomb threats.

To combat this, Zoom instituted two-factor authentication (2FA) as a way for teachers and students to secure their accounts. The company hopes the feature will stop hackers from penetrating video conferences, one of the main security issues that have plagued the service and even inspired lawsuits against the software maker since its marked increase in popularity during the COVID-19 pandemic.

What Are Some Other Back to School and Back to Work Scams?

Another common back-to-school scam that can be exploited with the surge of virtual learning is email phishing campaigns. In 2019, researchers discovered that students at hundreds of universities all over the world were being targeted with phony phishing emails, which contained attachments or links to fake university login portals or mimicked university library administration login pages.

How Can You Secure Your Virtual Learning or Remote Working Environment

Sadly, many school districts still haven’t woken up to the reality of ransomware attacks. Many are either ignorant of the threats or living in denial. For those who seek to be proactive in combating potential threats, here are some simple, but effective suggestions to consider:

Backup Your Data

Prepare for the worse! In this modern digital environment, expect that eventually you will be the victim of an attack. That’s why having backups is crucial. Store backups offsite so they won’t get infected if a ransomware attack hits your school or business.

Implement a Strong Identity Management Strategy

We can no longer rely on traditional firewalls and virtual private networks. Seek out and implement a strong 2-factor identification strategy with all the applications and software you employ. Proper identity management of users, including proper lifecycle management, authorization and authentication is of vital importance.

Automation

Automating your systems can also help IT departments save time and stay ahead of detecting and preventing hacks. Suppose someone on your school or company’s IT team is babysitting the network every day. In that case, you’re going to miss the times that parents, students or private employees have access issues or want to experiment with new applications or tools. So, if your IT team is focused only on the network’s traffic, they may miss a preventable event, like uploading a malicious program or opening a compromised file.

Scan and Wipe

Employ the use of software to scan for personally identifiable information. TThis will find sensitive and high-risk information, such as social security numbers and health records, and ensure that the data is stored in the network’s most secure place. IT teams can also utilize tools that identify misconfigurations and vulnerabilities. As more companies and school districts distribute devices to students and employees, they’ll need a remote wipe mechanism, perhaps a program that comes with mobile device management solutions. Remote wipe software tracks where devices are and erase the data stored on those devices remotely if they are stolen or lost.

If you are still having trouble, consider contacting remote technical support options.

You Might Also Like

WeHaveSolution247 Ransomware: Removal and Prevention
Nowzex Scam: A Cryptocurrency Cyber Threat
Warmcookie Malware: A Detailed Analysis and Removal Guide
Trojan:Bat/PSRunner.VSMSR Threat: Understanding and Removing Trojan Horse Malware
Ronaldosilvars.net: Removing Annoying Pop-Up Ads and Enhancing Online Safety

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

Your Details

Let us know how to get back to you.

Example: user@website.com
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article Qbot Banking Trojan Reemerges & Hijacks Legitimate Email Threads to Steal Sensitive Data
Next Article ransomware, stop/djvu Like it’s real life counterpart, Snake ransomware slithers into your system and injects it’s venomous malware payload into your computer
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Free

✅ Free Scan Available 

✅ 13M Scans/Month

✅ Instant Detection

Download SpyHunter 5
Download SpyHunter for Mac

//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Your Details

Let us know how to get back to you.

Example: user@website.com
www.rivitmedia.comwww.rivitmedia.com
© 2023 • rivitmedia.com All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US