Ransomware Attack on University of Calgary Forces $20,000 Payment
The University of Calgary paid a ransom in bitcoins amounting to $20,000 after a recent ransomware attack on its computer systems. According to the university, the staff was able to isolate some of the affected machines and was working to ensure its systems are operational. University Vice President of Finance and Services Linda Dalgetty said that the cyber-attack that crippled multiple systems on May 28 leaves no indication that any personal data was released to the public. She also added that the officials agreed to pay the ransom to ensure critical systems could be restored, but it may take some time for the school’s IT staff to apply the decryption keys to the infected machines.
“As part of efforts to maintain all options to address these system issues, the university has paid a ransom totaling about $20,000 CDN in bitcoins that was demanded as part of the ransomware attack,” Dalgetty explains. She also added that while paying the ransom was not exactly the “proper” course of action, the university could not risk losing critical data. “We are a research institution, we are conducting world class research daily and we don’t know what we don’t know in terms of who’s been impacted and the last thing we want to do is lose someone’s life’s work,” she added.
[READ: How does ransomware work?]
University officials are not sure about the source, or if it was done by one person, a group, or whether it’s local or international. Previously, the university suffered a data breach but this attack was different because it encrypted the school’s email server. “What we do know is that when we first identified the encryption, we did get a ransom note, so that’s how we knew it was ransomware. And we also knew that it was likely someone external who had planted that ransomware,” Dalgetty said. The university has been working double-time for more than a week trying to address the attack that affected the school’s email, Skype, wireless networks and other services. Meanwhile, users with university-issued computers were advised to keep them shut down while the systems remain under threat.
While Dalgetty claims that the university was able to confirm that the decryption keys work after paying the ransom, the school also acknowledged that ransomware is indeed becoming an increasing problem and that it is “a disturbing global trend of highly sophisticated and malicious malware attacks against organizations, including NASA, law enforcement agencies, and large health care institutions”.
This is not the first time an affected institution has paid a ransom. In February 2016, the Hollywood Presbyterian Medical Center in California paid 40 bitcoins (around $17,000) to decrypt the infected computers across their networks. Shortly after this incident, Kansas Heart Hospital in Wichita, Kansas fell victim to a ransomware attack in May 2016. According the hospital’s president, Dr. Greg Duick, a “small amount” was paid, but the hackers did not return full access to the files, instead demanded another ransom which the hospital did not pay.
[READ: Defending against ransomware]
The recent string of ransomware attacks highlights the risk involved in paying the ransom. The FBI has issued an advisory for users and businesses to decide against paying any ransom. “Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying the ransom not only emboldens current cybercriminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals,” says FBI’s Cyber Division Assistant Director James Trainor.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: TargetCompany
- Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know
- Preventing an Imminent Ransomware Attack With Early Detection and Investigation
- Inside the Halls of a Cybercrime Business
- Securing Cloud-Native Environments with Zero Trust: Real-World Attack Cases