An e-mail sent today claimed that your account was recently signed in from an unknown location. The e-mail had a subject of “Account Verification” and looked like the example below.
IT@Sam has blocked the website contained in the message as well as the delivery of additional e-mails to prevent the disclosure of additional login credentials.
If you still have an e-mail in your inbox with the subject of “Account Verification,” please delete the e-mail. No further action is required.
If you have already visited the site and entered your username and password, please
- change your password as soon as possible at https://samweb.shsu.edu, by clicking on the IT@Sam menu, then on Account Password Change; and
- contact the Service Desk (this will help us determine the magnitude of the Phishing incident).
Please contact the Service Desk at (936) 294-1950 should you have any questions, concerns, or trouble resetting your password.
Below is a message from Steven Frey, SHSU’s Information Security Officer. This is a good time to remind you to exercise good judgement when opening email or browsing the Internet. When in doubt of a message’s or site’s authenticity, please contact the Service Desk at (936) 294-1950 or by email at email@example.com.
News headlines are referencing a global ransomware attack. Ransomware is a type of malware that is usually delivered via an email attachment or link to a malicious website. When this malware is unintentionally activated by a user, it begins to encrypt all the files that the user has access to and then informs the user that they have to pay a ransom in bitcoin (an online currency) to decrypt the files. Until this is done, the only recourse the user has is to restore the files from a backup if there is one available, or if not, the user unfortunately pays the ransom. Often times, even when the ransom is paid, the hacker does not decrypt the files. This is why it is imperative that users backup their data, like IT@Sam does with the SHSU servers. Previous ransomware attacks against the university that made it past security controls were thwarted by IT restoring files to a previous version, usually from the day before.
A key difference with these ransomware attacks (yes, there are multiple variants from different hacking groups) is that they are not just encrypting files that the user have access to, rather they are exploiting a vulnerability in Microsoft Windows to encrypt all files hosted on every server or workstation that is vulnerable. Microsoft released a patch for this vulnerability in March 2017. At that time, IT@Sam patched systems that were know to be vulnerable.
However, on April 14th, 2017, a group of hackers known as The Shadow Brokers released a set of hacking tools that were stolen from the NSA. These hacking tools contained an exploit for the Microsoft vulnerability, meaning that with a push of a button, anyone could attack vulnerable servers and workstations, even if the user doesn’t have permissions to the files. IT@Sam decided to take immediate action on all servers to ensure they would not be vulnerable. This critical updated occurred during working hours and did disrupt a few services on campus last month, but they were quickly rectified.
These current ransomware attacks are using these hacking tools to encrypt all files they can where Microsoft has not been patched. Many organizations have not yet applied patches and are being negatively impacted. SHSU takes its security posture seriously, and makes it a point to be better safe than sorry. IT Security has rescanned the entire campus network, and no servers are reporting as vulnerable to this attack. A handful of workstations are vulnerable and are under investigation.
It is important to practice caution when opening attachments in emails or clicking on links as these are the methods used to begin these attacks. IT Security has taken the threat intelligence it has at this time to block known email subjects from entering SHSU’s email system and the campus Intrusion Prevention System (IPS) has rules in place to detect and block the malware that is currently known at this time. However, these can change rather rapidly which is why the IPS system gets updates automatically from the vendor to stay up to date. No security is 100%, but we will continue to monitor the situation as more information is released and take the appropriate actions to swiftly protect the students, faculty and staff of the SHSU community.
Information Security Officer, IT Security
Many people received an e-mail earlier today claiming to be an important Blackboard message. The e-mail had a subject of “Important Message.” or “New Important Message.” and looked like the example below.
The link included in the message was directed to a malicious site that requests your username and password. IT Security has contacted the appropriate parties in order for them to remove the malicious site.
If you still have an e-mail in your inbox with the subject of “Important Message.” or “New Important Message.”, please delete the e-mail.
If you have already visited the site and entered your username and password, please change your password as soon as possible at https://samweb.shsu.edu, by clicking on the IT@Sam menu, then on Account Password Change.
Please contact the Service Desk at firstname.lastname@example.org or (936) 294-1950 should you have any questions, concerns, or trouble resetting your password.
You can now report e-mails to email@example.com. Please be sure to send the entire message as an attachment.
Did you know that you can create an alias for your SHSU computer account? In order to add the alias, sign into SamWeb, select the IT@Sam tab, and click Account Alias Request. Here you can add an alias to your account, deactivate any other aliases you might have, and select which alias you would like to have as your primary. You can also view any deactivated aliases you have on file. Students can have one alias at a time, while faculty and staff can have up to three.