Organizational Ransomware Attacks

Ransomware can be localized to target individual users or systems, or expanded to larger groups and even organizationally focused with the intent of paralyzing an organization.  Recently, there have been a number of ransomware attacks that exploit unpatched vulnerabilities on servers connected to the internet, resulting in an attack against the entire organization, impacting all operations; in higher education this affected the ability to teach and do research.



The similarities that we have been able to draw between these recent organizational attacks are:


1)      Vulnerabilities are exploited to gain an initial foothold



We strongly encourage everyone to patch all networked systems; focus first on all internet facing servers, paying special attention to java-based servers as they are frequently targeted. If you require assistance in patching your servers, please contact your department’s IT Administrator.  If you are unable to patch your server or get help from your department, please contact


2)      Keyloggers are installed to steal administrative credentials, which are used to map network shares and deploy ransomware



For critical accounts that have control over multiple servers/systems (e.g. root, Administrator, etc.), use a privileged account manager that checks in and out the account, changing passwords for each usage.  Privileged accounts should have limited access to only those who need it and used only when necessary.  These accounts must not be used for checking email or web browsing or any other user related activity.


Anti-malware software must also be installed and kept up-to-date on all operating systems, such as Windows, Mac, and Linux.


3)      Ransomware encrypts critical files needed for research, teaching or administrative activities.



Use network file shares that are backed up regularly (e.g Home Drive, Teamshare, or Workspace) for the storage of critical files.  Keep backups off-line and accessible only via specific privileged accounts that have restricted usage.


For questions, please contact

Additional information