IT staff at the University of Calgary are believed to be still poring over its IT systems for encrypted data in the wake of one of the countryโs biggest disclosed ransomware attacks.
Some 100 systems were hit by the malware.
But it was just one of a leap in reported ransomware attacks here. Security vendor Trend Micro has seen a 20 per cent uptick in malicious requests to command and control infrastructure from infected machines over the last three months, saidย Mark Nunnikhoven, the companyโs Ottawa-based vice-president of cloud research.
โThat works out to a few thousand requests a day,โ he said, although not all would be unique. But it would include malware contacting C&C servers for the ransomware and the servers sending back decryption keys.
Ryan Kalember, senior vice-president of cybersecurity strategy at security vendorย Proofpoint, said in a statement his firm recently stopped multiple campaigns that sent hundreds of millions of messages worldwide in a single day.
Because the university has turned the incident over to police it isnโt saying anything more than carefully-worded statements by universityย Linda Dalgetty earlier this week.
โAt this point, we do have some encrypted machines,โ Dalgetty told the Calgary Herald. โWe have not used any of the decryption keys.โ She also said the university paid the equivalent of $20,000 in Bitcoin for the keys.
โThe university is now in the process of assessing and evaluating the decryption keys,โ Dalgetty said in a June 7 statement on the universityโs Web site. โThe actual process of decryption is time-consuming and must be performed with care. It is important to note that decryption keys do not automatically restore all systems or guarantee the recovery of all data. A great deal of work is still required by IT to ensure all affected systems are operational again, and this process will take time.โ
It is believed that as of Thursday it had still not used the keys.