Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 13 submissions in the queue.

Submission Preview

Link to Story

Uni Forces 38,000 Students, Staff To Queue with ID For Password Reset After 'Cyber Atttack'

Accepted submission by Arthur T Knackerbracket at 2019-12-19 08:34:22
Security

--- --- --- --- Entire Story Below - Must Be Edited --- --- --- --- --- --- ---

Arthur T Knackerbracket has found the following story [theregister.co.uk]:

Tens of thousands of students and staff at a university in Germany had to queue up this week after a malware infection on its campus network forced the college to reset everyone's account passwords.

The Justus Liebig University Gießen (JLU) says that a "suspected cyber attack" this month has caused it to shut down most of its online services for several days, and reset their logins.

In order to get new credentials, the school is requiring students to appear in person, meaning some 38,000 people have to show up with identification to get their passwords changed. Here's what that looks like...

"For security reasons, the university computing center has issued new passwords for all 38,000 JLU email accounts," a translation of the uni's alert [uni-giessen.de] reads. "All employees and students have to collect their new personal password personally."

The malware outbreak, which is said to have kicked off around December 8, spread through the university's internal network, including to PCs used by university professors. Because of this, the school says that in addition to resetting all passwords, it will have to scan and clean faculty machines.

To that end, the school is distributing USB sticks to staffers and asking that they use those drives to scan and clean their machines. Once that scan is done, the school says its IT staff will issue a second scan with an additional tool purpose built to detect the specific malware that hit the school. Once cleared, the PCs will be adorned with a green sticker signifying they are ready for use again.

Students will not need to clean their PCs, as the university says that pupils use a different network from faculty.

If there is any solace for JLU in all of this, it is the knowledge that it is far from alone in being hit with malware. School networks, both the university and primary levels, are attractive targets for both botnet operators and data thieves.


Original Submission