Home > Cyber News > University of Utah Attacked by Ransomware, Paid $457,059

University of Utah Attacked by Ransomware, Paid $457,059

Another case of an organization paying ransom to cybercriminals has been registered. The University of Utah in the United States just revealed that it paid a ransom in the amount of $457,059.

The reason for the payment is that cybercriminals threatened to leak student information online. This is yet another case of ransomware criminals stealing sensitive files prior to encrypting them.

University of Utah Ransomware Attack

According to the official statement, “on Sunday, July 19, 2020, the university’s College of Social and Behavioral Science (CSBS) was notified by the university’s Information Security Office (ISO) of a ransomware attack on CSBS computing servers. Content on the compromised CSBS servers was encrypted by an unknown entity and no longer accessible by the college.”

The statement also reveals that the ransomware succeeded to encrypt 0.02$ of the data stored on the university’s servers. The good news is that the staff successfully restored data from backups; however, the threat of having student details leaked online made them pay the ransom. The deed of paying was done as a preventive measure against further compromise.

The university’s cyber insurance policy paid part of the ransom, and the university covered the remainder. No tuition, grant, donation, state or taxpayer funds were used to pay the ransom,” the statement said.

The group behind the ransomware attack is still not known.

Ransom Demands Steadily Growing in 2020

Surprisingly or not, the ransomware demand has continued to grow in 2020. Coveware researchers recently revealed that the average ransomware payout has increased in the first quarter of 2020, reaching the staggering $111,605, with Ryuk and Sodinokibi ransomware families being the main culprits for this increase.

One reason for this growth is that advanced ransomware groups typically utilize methods that give them access to more valuable assets. Such attacks usually exploit unpatched vulnerabilities in public-facing apps and compromised MSPs (managed service providers). The later stages of these attacks include establishing persistence, escalating privileges, bypassing protections, obtaining various credentials, mapping networks, stealing files, and later encrypting them.

As for the case of the University of Utah, an analysis showed that specific vulnerabilities were at fault for the attack, because of its decentralized nature and complex computing needs. “This incident helped identify a specific weakness in a college, and that vulnerability has been fixed,” the university officials said.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:

Leave a Comment

Your email address will not be published. Required fields are marked *

Share on Facebook Share
Share on Twitter Tweet
Share on Google Plus Share
Share on Linkedin Share
Share on Digg Share
Share on Reddit Share
Share on Stumbleupon Share