2nd May, 2022 – CloudSEK has identified a 20% increase in cyber threats targeting the global education sector in the first quarter of 2022, as compared to the same period in 2021. The growing global education and training market is a breeding ground for cybercriminals targeting entities and institutions in the sector. Remote learning, digitization of education, and prevalence of online learning platforms are key triggers that enlarged the attack surface.
CloudSEK’s investigation indicates that the majority of cyber incidents in 2021 targeted educational institutions in Asia & Pacific, followed by Europe, North America, South/ Latin America, and the Middle East.
Of the threats detected in Asia & Pacific, 58% of them were targeted at Indian educational institutions and online platforms. This includes attacks on major players like Byju’s, IIM Kozhikode, and Tamil Nadu’s Directorate of Technical Education.
Overview of the Cyber Attacks Targeted at the Education Industry
· CloudSEK XVigil’s findings indicate that several cybercriminals are actively leaking databases, accesses, vulnerabilities/ exploits, and other information belonging to educational institutions, on cybercrime forums.
· Databases and accesses are the most commonly sought after data types. The databases leaked from educational institutions primarily contain:
o Personally Identifiable Information (PII) of students and their families, including name, date of birth, email address, phone number, and physical address.
o Website user records and credentials
o Examination results and scores
Increase in Dark Web Activity Related to Indian Education Sector
· A threat actor advertised Citrix access to BYJU, an Indian multinational educational technology company, headquartered in Bangalore.
· In addition, another threat actor leaked BYJU’s databases. The data was purportedly exposed due to an unprotected SalesKen server that had been left unsecured, without a password, since 14 June 2021. The databases contained:
o PII and sensitive information related to students, parents, and instructors
o Conversation logs between parents and staff, including remarks about their children.
o Copies of emails with codes to reset user accounts and internal Salesken.ai data
· Furthermore , a threat actor shared a post advertising access to the SMTP server and API credentials of allegedly the largest Indian ed tech platform.
· A threat actor shared the website user records from the official website of Indian Institute of Management Kozhikode, an autonomous public business school located in Calicut, Kerala. The institute is fifth out of the 20 IIMs in India.
· A threat actor leaked 190,000 PII records of students who appeared for the 2020 CAT (Common Admission Test) exam, along with their scores. CAT is a computer-based test for admission to graduate management programs.
· Threat actor sharing the 2020 CAT exam database [by CloudSEK]
· On 18 December 2021, a threat actor shared the database from Aakash Educational Services Limited (AESL), a leading test-prep company in India that provides test preparatory services for students preparing for Medical and Engineering entrance exams, School/Board exams, and competitive exams such as NTSE, KVPY, and Olympiads. The actor was found selling this data on multiple platforms.
· A threat actor shared the PII from Tamil Nadu’s Directorate of Technical Education.
The two threat actors who go by the handles “babam” and “Kristina”, posted more data leaks and accesses than any other threat actor, find the full report [here]
Given the size and impact of the education sector, it is critical for institutions, students, parents, teachers, and the government to ensure that the information gathered and stored is not leaked and exploited by cybercriminals. To ensure this, we recommend that:
· Educational institutions and related government entities:
o Create awareness among users regarding cyber-attacks, online scams, and phishing campaigns
o Enact strong password policies and enable multi-factor authentication (MFA)
o Update and patch software, systems, and networks on a regular basis
o Maintain multiple backups, both online and offline, in separate and secure locations
o Monitor logs for unusual traffic and activity to websites and other applications
o Block illegitimate IP addresses and deactivate port forwarding using network firewalls
o Perform real-time monitoring of the internet to identify and mitigate low-hanging threats, such as misconfigured apps, exposed data, and leaked accesses, that are leveraged by cybercriminals to carry out large scale attacks.
· Students, parents, faculty, and staff should:
o Avoid clicking on suspicious emails, messages, and links
o Not download or install unverified apps
o Use strong passwords and enable multi-factor authentication (MFA) across accounts
About CloudSEK: CloudSEK is an AI-driven Digital Risk Management Enterprise. CloudSEK’s XVigil platform helps clients assess their security posture in real-time from the perspective of an attacker. XVigil scours thousands of sources (across the surface, deep and dark web), to detect cyber threats, data leaks, brand threats, identity thefts, etc. To learn more about how the CloudSEK XVigil platform can strengthen your external security posture and deliver value from Day 1, visit https://cloudsek.com/