Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security Network The Almighty Buck

Michigan State University Network Breached In Ransomware Attack (bleepingcomputer.com) 8

Netwalker ransomware-as-a-service (RaaS) operators have reportedly breached Michigan State University's network, threatening to leak private files to the public if they don't pay a ransom in time. BleepingComputer reports: A countdown timer on the attacker's website shows that the university has about six days to comply or "secret data" will become public. The site set up by the Netwalker ransomware gang gives no details about the attack but they posted images with directories, a passport scan, and two financial documents allegedly stolen from the university's network. Information about how and when the attack happened, its impact on MSU, and the ransom demand remain unknown at this time.
This discussion has been archived. No new comments can be posted.

Michigan State University Network Breached In Ransomware Attack

Comments Filter:
  • You always get more of anything you buy or subsidize.
    • by Toonol ( 1057698 )
      If it was happening in secret, I think the university would pay the ransom, but by forcing the publicity I think they will have to commit to not paying.
      • If it was happening in secret, I think the university would pay the ransom, but by forcing the publicity I think they will have to commit to not paying.

        Are you serious? You know that they are going to pay.

  • ...more trolls will come.

    Public companies, universities, and government agencies should commit to
    - securing their networks. Enough of this "we didn't get around to it" stuff.
    - not paying ANY ransomware or encryptionware or malware demands
    - keeping offline [cold storage] backups so they can restore in under 24 hours, and TEST THAT RESTORE function
    - hire competent people, not just "that guy who's been here forever so he's in charge now"
    There's more but you get the point.

    NEVER EVER GIVE IN TO TERRORISM because

  • Do they threaten to release the same data multiple times? I mean honestly how do you verify that the data is deleted once you've paid the ransom?

    It's not like kidnapping where there is only one unique individual that can be returned. It's like a kidnapping where they return a clone and can make infinitely more. The economics of it don't scale in a sensible way.

Get hold of portable property. -- Charles Dickens, "Great Expectations"

Working...