On Monday morning, TU Eindhoven released reports on the hacking incident that occurred last January, leading to a days-long disruption of education. At that time, the university took the network offline to prevent further issues.

The hacker was likely aiming to encrypt the systems, believes Fox-IT, the company that investigated the attack for the university. With so-called ransomware, hackers can lock down the systems; you regain access after paying a ransom.

Stolen passwords

According to an evaluation, the university proved resilient. However, the security could be improved. The hacker accessed the network remotely using stolen usernames and passwords. Two-factor authentication (with an additional check via your mobile phone) could have prevented this.

Furthermore, the university was aware that these login details had been stolen and were available on the dark web. Affected staff and students had previously been requested to change their passwords, but some ‘changed’ their password to the same (and therefore stolen) password. “We hadn’t technically secured that properly”, says chief information security officer Martin de Vries to the university newspaper Cursor.

Little experience

The hacker likely didn’t have a lot of experience. After a few days, he attempted to disable the backups and installed a tool that triggered alarms. He essentially kicked the door in, De Vries tells Cursor. “I expected he would want to remain under the radar for longer.”

Who is behind the hack remains unknown. Fox-IT detected traces of Cyrillic script, but that was not enough to determine the origin.

Higher education institutions are increasingly facing cyberattacks. The most well-known case is the ransomware attack on Maastricht University, during which a ransom of 200,000 euros was paid, although the university later recouped it with profit.

Read more

TU Eindhoven hit by cyber-attack

There is currently no wifi on the TU Eindhoven campus, and the internal systems are down.…

No comments yet — start the discussion!