Dutch college’s fast response saved it from ransomware devastation
Earlier this 12 months, Eindhoven College of Know-how (TU/e), one of many Netherlands’ main technical universities, demonstrated the uncomfortable fact that even organisations that tick all of the cyber safety containers can fall sufferer to stylish assaults, when attackers gained enterprise-level entry to its community and commenced making ready what forensic investigators later concluded would have been a devastating ransomware assault.
The college’s response was dramatic: it disconnected all 14,000 college students and 4,700 employees from the web for a complete week. That choice, taken inside hours of detecting the breach, prevented what might have been months of crippled operations and hundreds of thousands in ransom calls for.
The incident started on 6 January, when attackers used legit credentials discovered on the darkish internet to entry TU/e’s digital non-public community (VPN) system. 5 days later, they launched an assault, and inside hours, they gained the best administrative privileges on the area controllers – successfully having full management over the community – and began putting in persistence instruments typical of ransomware preparation. This triggered the safety monitoring.
The paradox dealing with Martin de Vries, TU/e’s chief info safety officer (CISO), illustrates an uncomfortable fact about trendy cyber safety: excellent prevention stays elusive, even for well-prepared organisations. Nonetheless, when the disaster name got here that Saturday night, his staff’s fast response would show the distinction between every week of disruption and potential devastation.
The state of affairs De Vries encountered was a cyber safety nightmare: attackers with enterprise privileges combating his staff for community management.
“It was a cat-and-mouse recreation,” he recollects. “Each time we disabled an account or tried to phase servers, we noticed them on one other server. As a result of that they had these privileges, they have been additionally taking away our entry rights whereas we have been taking theirs.”
With standard containment measures failing, the choice was made to sever the college’s connection totally, taking TU/e’s 14,000 college students and 4,700 employees offline for what turned out to be every week. Nonetheless, forensic evaluation by Fox-IT later confirmed this choice prevented a devastating ransomware assault.
Implementation gaps
TU/e’s expertise exposes the hole between safety consciousness and flawless execution that haunts even essentially the most diligent organisations. On the finish of 2024, the college recognized compromised credentials belonging to a number of consumer accounts, flagging them as “dangerous customers” via its monitoring instruments. “We knew these accounts have been leaked,” admits De Vries. “We recognized them on the finish of final 12 months and despatched customers directions on altering their passwords. However a configuration error allowed them to re-enter the identical password.”
This single oversight undermined what ought to have been a profitable remediation course of.
Equally, multi-factor authentication for the college’s VPN was already deliberate and budgeted for. “It was on the schedule to be carried out by summer season,” he says. “It might have been deployed round this time.”
As a substitute, attackers exploited its absence to realize preliminary entry utilizing the darkish internet credentials.
The response showcased the Netherlands’ collaborative method to increased schooling cyber safety. TU/e advantages from SurfSoc, a safety monitoring service delivered by Fox-IT and managed by Surf, the collaborative organisation offering IT companies to Dutch universities and analysis establishments. Surf detected the malicious exercise at 9:55 pm and alerted TU/e by 10:48 pm, even because the college’s safety staff responded to inside alerts. This redundant detection system accelerated the response timeline.
“We have been already conscious of potential malicious exercise when Fox-IT, working Surfsoc, contacted us,” says De Vries.
When TU/e referred to as Fox-IT’s emergency response line at 11:50 pm, Fox-IT supported TU/e’s choice to disconnect the community instantly. The community went offline at 1:17 am on the Sunday, slicing off attackers who had been putting in distant administration instruments, creating privileged accounts and making an attempt to disable backup methods – all hallmarks of ransomware preparation.
Disruption versus injury
The choice to take 20,000 customers offline for every week was not made flippantly, however the various would have been far worse. Fox-IT’s forensic investigation concluded that “the adversary exhibited many traits typical of a ransomware assault”, with fast escalation to area administrator privileges and makes an attempt to disable backup methods following established ransomware playbooks.
“The most important influence for the college was on college students and employees,” says De Vries. “We needed to postpone exams; lecturers needed to mark papers over prolonged durations. That influence can’t be expressed in euros”. But the monetary calculation was stark. The direct prices of the response remained manageable – “not akin to what we spend yearly on safety”, in response to De Vries. Had ransomware been efficiently deployed, nonetheless, “it in all probability would have been within the hundreds of thousands”.
The human value, whereas vital, was short-term. Examination schedules have been rearranged, analysis actions paused, and regular operations disrupted, however the college’s core features remained intact. A profitable ransomware assault might have crippled operations for months whereas demanding substantial ransom funds with no assure of information restoration.
TU/e’s capability to reply decisively stemmed from common disaster preparation. The college participates in Surf’s sector-wide Ozon cyber disaster train each two years alongside annual inside drills, guaranteeing disaster groups know their roles earlier than catastrophe strikes. “Everybody within the disaster organisation knew their function,” says De Vries. “You don’t need to be one another asking, ‘How did this work once more?’ when the true disaster hits.”
The disaster administration construction activated easily, with clear communication protocols and outlined obligations. This organisational readiness enabled the fast decision-making that contained the assault.
This preparation prolonged past TU/e’s partitions. The college’s choice to publish detailed forensic studies displays the Dutch increased schooling sector’s collaborative method to cyber safety, starkly contrasting company secrecy round breaches. The precedent was set by Maastricht College, which suffered a serious ransomware assault in 2019 and shared its experiences brazenly to assist different establishments. “We’re universities – we’re about gaining and sharing data,” says De Vries. “There’s a tradition within the schooling sector of sharing these experiences so others can study from them.”
The collaboration is systematic: college CISOs meet month-to-month via Surf to share intelligence and finest practices. “There’s no college that doesn’t have this on their radar,” he notes.
Persistent dangers
Advanced analysis environments create persistent vulnerabilities. TU/e helps analysis teams utilizing Home windows 7 tools, necessitating older authentication protocols that attackers can exploit.
“We now have an IT panorama that should assist each previous and new methods as a result of analysis teams have tools that also works completely for his or her analysis however makes use of older working methods,” says De Vries.
Since resuming operations, TU/e has carried out particular person safety assessments earlier than reconnecting analysis methods to the web.
Regardless of the profitable response, he stays life like about future threats. “It’s not a query of if, however when,” says De Vries. “It’s a must to put together as an organisation for it to occur, irrespective of how good your safety is.”
His recommendation to fellow safety leaders is sensible: commonly drill disaster response groups and guarantee detection methods work across the clock. “You want good detection so you’re correctly knowledgeable when issues go unsuitable, and a disaster organisation that may act instantly,” says De Vries.
TU/e’s expertise proves that even well-prepared organisations stay susceptible. However fast detection, decisive management and accepting short-term disruption can forestall far higher long-term injury. When excellent safety stays not possible, response high quality determines influence.