Hackers' Cyber Attack On University Got A $20,000 CND Ransom in Bitcoins

The University of Calgary in Canada was hit by a malicious malware attack crippling the IT systems of the institution on May 28. The university was forced to pay $20,000 CND in the virtual currency of Bitcoins in efforts to gain back access but hackers locked or encrypted their computers and networks as a form of hostage on June 7. The University wrestled the issue for a week before giving up.

The university is now considering and is on an evaluation process of the decryption keys which the hackers provided. National Post reported that it would take some time for the university's IT staff to apply the encryption keys. The cyber attack infected more than 100 computers requiring IT staff of rigorous work to ensure all affected systems are operational again.

So far the university has some encrypted machines and has not used any of the decryption keys from the hackers. The University of Calgary's vice president, Linda Dalgetty said in International Business Times that the actual decrypting procedure is time-consuming and must be performed with care. The decryption keys do not automatically restore all systems or guarantee a total recovery.

Upon justifying their decision, its students are against the institution's choice to pay up. Experts said in CTV News Calgary that the situation will only get worse when cyber criminals, get paid getting what they want - no matter what happens. These cyber attackers are targeting major organizations.

This massive and devastating 'ransomware' attack was not the first. Last December, the owner of Kensington Wine Market was forced to pay untraceable Bitcoin of $500 to get their system out of the clutches of hackers.

The university's email was up and running for students and staff as of June 6. The university is currently in cooperation with the Calgary police. Other post-secondary schools are now on alert, being extra vigilant.

The cyber criminals send files via e-mail and poses as legit attachments or links. Once the victim clicks on the link or opens the attachment, the encryption starts.

© 2024 ParentHerald.com All rights reserved. Do not reproduce without permission.

Join the Discussion
Real Time Analytics