University College London (UCL), a leading research institution, faced almost 60 million malicious email attacks in the first three months of 2022, according to official figures.
The data, which was obtained through the Freedom of Information (FOI) Act and analysed by the Parliament Street think tank, revealed that a total of 58,628,604 spam, phishing, malware and edge block attacks were successfully blocked by the university between December 24 2021 and March 23 2022.
Edge block, which automatically blocks email messages sent to recipients that do not exist in the Office 365 tenant, accounted for 88%, 51,445,726, of malicious attacks blocked.
Spam emails made up 6,720,913 of attacks blocked, while phishing accounted for 408,212 attacks and malware for 53,753 attacks.
UCL stated that it only keeps records for the number of blocked emails for 90 days.
The news comes amidst rising cyber fears among higher education institutions, with the National Cyber Security Centre (NCSC) strongly advising organisations to ‘follow the actionable steps in the NCSC guidance that reduce the risk of falling victim to an attack’.
Tim Sadler, CEO and Co-founder of Tessian, commented: “Education institutions are regularly targeted by cybercriminals who want to get hold of the valuable information and data they hold, such as world-leading research, intellectual property and the personal financial details of thousands of university staff, students and alumni. Due to the people-heavy nature of the industry and reliance on email to stay connected with one another, phishing is an easy way ‘in’ for these cybercriminals and it quickly leads to loss of data and ransomware attacks.
“In recent years, some universities have ‘paid off’ ransomware cyberattacks and this could encourage even more to occur. Moving forward, it’s imperative that universities understand the ways in which their staff and students could be targeted by phishing campaigns, and train them on what to look for. Investment in technology that can warn individuals of threats in their inbox, too, will help people as they continue to study and work remotely.”
Achi Lewis, Area Vice President EMEA, Absolute Software, commented: “Large institutions represent lucrative targets for cybercriminals, holding vast amounts of sensitive data as well as a large number of endpoint devices. Malicious actors are only looking for one successful attack to compromise that sensitive information on an endpoint or breach or compromise access to a network to cause serious damage.
“It is imperative that organisations are not only aware of these attacks, but also put in place sufficient measures to both prevent attacks and recover from them should a successful threat land. Utilising a resilient Zero Trust approach to verify all users accessing important data, can help stop an attack before it happens. While it is also important to have recovery policies and technologies in place to shut down or freeze infected devices to prevent an attacker accessing other areas of an organisation’s IT network.”