Hackers infiltrate TU Eindhoven network: How could this happen?

tue, atlas, hoofdgebouw, den dolech 2 5600 mb eindhoven

Already a number of customers and acquaintances of ours have asked do you know what exactly happened at the TU in Eindhoven? Reason enough to pull together some earlier news items and take you through these events.

On Sunday, Jan. 12, TU Eindhoven's (TU/e) network was hit by a hack. The university was forced to take its own network offline, resulting in a one-week recovery period. Although the perpetrators are still unknown, their modus operandi is now clear: stolen login credentials were obtained through infostealers. But how could such a thing happen?

TU/e is working with security firm Fox-IT to investigate the incident. According to De Volkskrant, the hackers entered via stolen login credentials, which also appeared in criminal data, including log data from infostealers. Other educational institutions have been notified, and Radboud University Nijmegen has already taken extra authentication measures to protect against cyber threats.

The early phase of the ‘killchain’

Hackers are constantly trying to penetrate networks through various digital backdoors. Zero-days (undiscovered vulnerabilities) and unpatched services are the most obvious routes. However, malicious actors prefer easy access via legitimate login credentials. This ‘front door’ to the network allows attackers to easily steal or encrypt data.

But how do hackers get these login credentials? Methods such as gambling and brute-forcing are often unreliable or too slow. A much easier way is to buy legitimate login credentials through the dark web. Websites like the Genesis Market, taken down in 2023, acted as a kind of all-in-one store for sensitive login credentials that hackers could buy. However, this is already a later stage in what Lockheed Martin calls the “Cyber Kill Chain”; something happened earlier to compromise the data.

How infostealers work

Infostealers target the beginning of this killchain and aim to steal sensitive data. This data can vary: some infostealers are only after credit card information, while others want to get browser history. In the case of TU Eindhoven, it may be a username and password. Sometimes more is needed and infostealers combine login information with other details such as phone number, e-mail address or home address.

This form of malware infiltrates users through familiar routes: phishing emails, malicious attachments or compromised Web sites. Security firm Packetlabs concludes that the best infostealers are modular in nature. They first scan the environment they enter, and later install specific payloads. This minimizes the malware's footprint, or in other words, there is as little evidence of its existence as possible. Ideally, the infostealer sends the smallest possible data packets over the network to a remote Command & Control (C2) server with as many valuable digital assets as possible.

According to Lockheed Martin's framework, even more work is required. Infostealers can establish themselves in a system without difficulty, but must also be able to covertly contact the servers of malicious actors. They count only as a first step in the killchain: backdoors, unpatched vulnerabilities and zero-days are a hacker's friend for further exploitation.

Infostealers are already well established in the Netherlands. More than 40,000 Dutch people, especially IT professionals, have been infected with them, according to research by RTL Nieuws. Among them could just be an employee of TU Eindhoven.

Targets

These 40,000 Dutch people are difficult to protect. Infostealers, like other malware, can reach victims in many ways. Their methods are highly varied, with varying consequences. For example, an infostealer can steal information via screen captures, keylogging, taking over a browser, dumping locally stored login credentials, stealing emails or monitoring the clipboard. In short, once an infostealer is installed, there are all sorts of ways in which data can be captured.

No user is safe, but the most valuable data to hackers is that of executives, IT professionals with many permissions in the network and servicing accounts. The latter category is often overlooked, resulting in detection not happening or coming too late. Infostealers also frequently target certain high-value sectors, such as banking or, in the case of TU/e, high-tech targets. The first prominent infostealer described as such was Zeus in 2007, which caused all sorts of incidents of fraud and botnets. Moreover, it could multiply and spread itself like a classic virus.

Awareness

This article shows that it is and remains important to be continuously engaged in Cybersecurity Awareness within your organization. Sharing these kinds of stories and giving examples can be an important first step. If you need help with this then of course we are happy to help. Super logical right?

Sources: Techzine and the Volkskrant
Image: Wikipedia

Recent blogs

kwantumcomputers
Blog
What are quantum computers? And why is everyone suddenly talking about them?
Chances are you've been hearing more and more about quantum computers in recent months. In the news, on LinkedIn, or perhaps even during conversations about AI and cybersecurity. Especially now that a Dutch chip developer is gaining global attention with a new generation of quantum chips, the technology suddenly seems closer than ever. But what exactly is a quantum computer? And why is so much expected of it? From Ordinary Computer to Quantum Computer To understand quantum computers, it's helpful to first look at how a normal computer works. A traditional computer — like your laptop or server — works with bits. A…
frankberry
Blog
With our feet in the mud
Here we are. Not quite recognizable anymore, thanks to AI trying to protect children. Understandable, of course. But believe us: these really are Berry and Frank. More than ten years apart, but in reality, we've always been brothers from another mother. And what do we have in common? A lot... and at the same time, almost nothing. Berry is often the good cop. Calm, down-to-earth, and always working to get things done. I'm usually the bad cop. Direct, critical, and always looking for ways to improve. But that combination is precisely what works. What completely unites us, though, is our love for...
Macadmins Leiden
Blog
MacAdmins Meeting: What's relevant for your organization?
Last week, we attended the MacAdmins Meeting in Leiden. It's a gathering focused on Apple administration, security, and innovation. What stood out? Developments are moving fast. But more importantly: they are becoming increasingly relevant for SMEs. We'd like to share the key insights with you. What's happening? And what does that mean for your organization? Running AI Locally: Control Over Data and Costs AI is now everywhere. But one question remains central: where does your data reside? A significant topic during the meeting was running AI models (LLMs) locally. Instead of relying on external cloud platforms, more and more...

A newsletter

Superlogic right?