Universities Schooled By Malware: Higher Ed Networks 300 Percent More Infected
That universities suffer more malware infections than enterprises and government agencies should come as no surprise, but new data shows that they are a whopping 300 percent more likely to house malware in their networks than networks in the commercial or public sector.
Research from OpenDNS’s Umbrella Security Labs found that colleges and universities in the U.S. and Europe are that much more infected than the business or government space, based on data gathered from OpenDNS’s network of 50 million users worldwide.
“That [percentage] was somewhat of a surprise to us,” says Dan Hubbard, CTO of OpenDNS and head of Umbrella Security Labs. “You always hear about universities being more open than regular corporations and organizations, but these numbers were a little higher than we expected.”
Higher-education networks also are targeted most by the so-called EXPIRO malware, a file-infecting family that’s been around since around 2010. According to OpenDNS, EXPIRO typically infects local, removable and network drives and installs malicious extensions for Chrome and Firefox. It steals stored certificates and passwords from IE, Microsoft Outlook and FTP client FileZilla.
Infected machines redirected to a malicious URL, and can steal online banking credentials and other information, and the malware also can disable Windows security on the infected machine.
So why is EXPIRO the BMOC, big malware on campus? “It’s hard to tell what they are after. There are multiple variants of EXPIRO,” Hubbard says. It can be used to steal usernames and passwords and Web history, for instance, he says. “That user information is wrapped in a DLL and it sent back to a CC [command and control] in an encrypted file,” says Hubbard, who notes that EXPIRO has been spotted using exploit kits such as Blackhole.
EXPIRO malware is typically spread via infected websites, either drive-by attacks or via a phishing email URL lure. The infected website typically hosts a Java or Adobe PDF exploit, which once installed steals user and system information.
The big problem on university campus networks, of course, is that they by nature are open and IT doesn’t manage each student’s client device. “These are unmanaged networks for the most part,” Hubbard says. Even so, universities can establish basic security best practices to minimize infections, he says.
OpenDNS recommends that colleges alert their users of new spearphishing campaigns targeting their institution, and that they employ predictive analysis to prevent waterholing or malvertising attacks. OpenDNS also suggests using DNS-based enforcement to stop infected machines from communicating to botnet operators over non-Web connections.
Have a comment on this story? Please click “Add Your Comment” below. If you’d like to contact Dark Reading’s editors directly, send us a message.