We all know that schools are a growing target for cybercriminals, and it's not uncommon for schools in the same region to be hit.
For example, multiple schools in the West Midlands and Lancashire were targeted within a few weeks of each other. In these incidents, attackers compromised staff email accounts.
In this blog, we explore why local schools are often attacked, what kinds of attacks these can be, and how schools can protect themselves.
What is email compromise?
This is when an attacker gains access to someone else’s email account. They are actually logged into the account and send emails as though they are that person.
They can do this by using that person’s login details they’ve found elsewhere, obtained via social engineering such as a phishing email, guessed from information online, or broken into using automated password guessing techniques like password spraying and brute force guessing.
Who is particularly vulnerable to email compromise?
Targeted phishing attacks, known as spear phishing or whaling, happen when criminals identify staff with the highest levels of privilege in the school and target them with personalised messages. This could be the leadership team, business leaders and IT staff. Criminals know that these people have administrative access to systems and can be responsible for paying invoices and other bills.
What kinds of messages do the attackers send?
An attacker’s main aim is likely to be financial. They may send emails asking for money to be transferred into their bank account. They do this by faking invoices to trick people into thinking they are paying for school supplies, building work, or trips.
1. Implement multi-factor authentication on all email accounts
2. Secure student email accounts
3. Employ basic cyber hygiene
Sometimes, attackers use very simple methods to compromise accounts, and cybersecurity basics can help prevent this.
Remember phishing training
Identifying a phishing email that looks like it’s from someone you know is more tricky, as their email address will be correct. However, the content of the email is likely to be off and probably won’t sound like the person it looks to be from. Remind colleagues to consider whether they are expecting the email if the content is unusual or if it’s been sent at an unusual time.
Set up a phishing reporting process
We advise schools to set up a way for staff to report phishing emails. It is best to use a specific email only for this purpose so that IT staff aren't tricked by forwarded emails themselves. Maybe phishing@schoolname.com. Staff can also use this address if they think they have fallen for a phishing email.
Share incidents internally and with other schools
The quickest way to reduce the risk of regional or group attacks is to share intelligence and incidents with others. If email accounts have been compromised, let others know to be vigilant. If you receive a suspicious email purporting to be from a known source, screenshot it and share it internally and with other schools. The emails the attackers send to the different schools are likely to be similar in tone and content.
What if your suppliers experience business email compromise?
This kind of attack can happen to your suppliers too. Once criminals have compromised their email, they can send fake invoices with different bank account details.
Be on extra alert if your school is undergoing major work, and always check if suppliers change their bank details.
Case study
Recently, a school trust in England lost almost £400,000 in this way. They were tricked into paying invoices into a fraudulent bank account they thought was their builder’s.
Contact the sender via another means
If you’re suspicious about an email or message, always err on the side of caution. Find alternative contact details for that person, such as a phone number that isn’t included in the email. Call them and ask them if they have sent the message. It’s always better to be safe than sorry.
This type of sophisticated attack can trick anyone, and colleagues need to feel confident they can report mistakes without blame or incrimination. The incident response process can then be put into action.
Read about cyber incident response planning in our community. Click the image to join.