Nah, in reality someone probably clicked a link in a malicious email that launched a backdoor on their computer. The likelihood of that approaches 100% on untrained users. And, as this is a university environment, that user likely had local admin.
You only need 1 successful click to breach the good ol' "secure internal network" after which all bets are off - few companies sufficiently secure their networks from "internal" attackers.
On a traditional Windows network, credential hygiene practices are woeful and Domain Admin (admin access to every single domain-joined device on the network) level credentials are lying around everywhere and once those are compromised, every single domain-joined device on the network can be compromised.
I've seen this all happen in the span of 10 minutes - a remote user with VPN gets compromised, the attacker connects to the corporate network through them, gets Domain Admin and spreads malware through Active Directory to every single device on the network - X thousand workstations, Y hundred servers etc.
There's no actual vulnerability to remediate - you just have to "administrate properly" to prevent this. (https://aka.ms/spa)
In 2019 this is actually very unlikely. Driveby exploits have been pretty rare for years now.
"It's not an Advanced Persistent Threat, it's Basic Ass Threat, but you just want your cyberinsurance policy to pay out. Fuck off"
Russia initially compromised the 2018 Olympics with publicly available malware off GitHub.
See: https://www.wired.com/story/untold-story-2018-olympics-destr...
"All dhcp-servers, Exchange-servers, domaincontrollers and networkdrives have been encrypted."
Source in Dutch: https://tweakers.net/nieuws/161538/deel-diensten-universitei...
Clop: https://securingtomorrow.mcafee.com/blogs/other-blogs/mcafee...
[1] I’d expect it to be earlier than that, but this article date is the only thing I’ve found: https://www.microsoft.com/en-us/wdsi/threats/malware-encyclo...
As someone else said it, many networks are crunchy on the outside, chewy on the inside.
We need a new model, that makes lateral movement much harder. There's no reason to allow an infected domain controller to infect the whole network, but I don't know what the solution looks like which still allows centralized control.
Certainly you can steal data from non-Windows systems, so exfiltration attacks are similar on both, but AFAICT, these "we've got your data" style attacks are unique to Windows. If an IT (desktop/laptop) environment was more Mac-heavy, would these be an issue either?
[1] https://en.wikipedia.org/wiki/Morris_worm
PS Edit: Many routers are linux/unix based so it is a much bigger target than a lot of people on this thread are making out. If you have control of a company's routers you are in position to do a lot of damage.
If I had a nickel for every RHEL 5 (yes, 5!) box still running after we begged customers to please, please move to something actually receiving patches...
In theory ransomware shouldn't have as large of an impact, but in practice backups are not a magical wand of "restore website and lose 0 transactions" either. That's assuming the backups are actually configured to grab the correct data, and haven't been silently failing for months...
What now?
https://techtalk.pcmatic.com/2019/01/09/ransomware-attacks-2...
I think the date should be December 2019 (not January), judging from the list of incidents by month.
One I know of, against Regis University in Colorado, occurred in late August (first reports from August 22).
https://www.regisupdates.com/regis-quick-updates/test-post
It's mainly a Windows shop. Lots of disruptions for weeks (I teach there part-time, but was not teaching that term). By November(!) things were pretty much back to normal:
https://www.regisupdates.com/regis-quick-updates/its-updates...
[0] https://tweakers.net/nieuws/161538/deel-diensten-universitei...
- https://www.denbi.de/news/763-shut-down-of-de-nbi-services-h... - https://www.instagram.com/jlu.giessen/?hl=en
Here's a few Dutch sources at the bottom you can throw through a translation service: "nearly all windows computers were hacked", "we dont know if this was criminal and if the perpetrator(s) demand money".
Noteworthy quote "We are researching if the attackers could access that. Our expectation is that this is very difficult." on the storage of scientific data.
https://nos.nl/artikel/2316120-cyberaanval-op-computers-van-... https://www.1limburg.nl/groot-cyberhack-bij-um-criminele-aan...