Wednesday, March 19, 2025
HomeBackdoorHackers Steal Over $800,000 By Dropping a Malware On Cod Community College...

Hackers Steal Over $800,000 By Dropping a Malware On Cod Community College Computer Systems

Published on

SIEM as a Service

Follow Us on Google News

The Cape Cod Community College suffered a massive cyber attack, the attackers steal college banking information and allegedly transfer $807,130 from College. The attack starts with a phishing email.

Cyber Criminals currently targeting various colleges and universities around the worlds through social engineering and malware attack on employees and students.

The attacks start with the phishing Email with an attachment that appeared to be sent from another college, the attachment is the malware dropper that bypasses antivirus software and compromised the systems.

College President John L. Cox said that malware is sophisticated than expected and spreads to other computer and entered in the Nickerson administration building.

The malware targeted the college’s financial transactions. It appears as though it overwrote the URL address for the college’s bank, TD Bank, creating a fake site that looked and functioned like the financial institution,” Cox said to Cape Cod Times.

Hackers also managed to make fake phone calls and trick the employees to approve the face transactions, they attempted 12 such transactions to steal $807,130 and the TD Bank recognized three as unusual and stopped them.

The bank managed to block such three fraudulent transactions and recovered $278,887 till date. Now the college working with FBI and TD to recover the funds. College confirmed none of the students and employees personal information is compromised.

“This attack on our College’s security demonstrates the power and danger of modern cybercrime. Despite ongoing cybersecurity training and continuous upgrades to the College’s network security, those with the power to execute a sophisticated malware attack found a way to do so,” Cox said.

The college has replaced all infected hard drives and will continue to install next-generation endpoint protection software across the campus, Cox said.

Cape Cod Community College leaders told faculty they are confident they will recover “most, if not all” of the $807,130 taken through cybertheft.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture...

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a...

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...

Electromagnetic Side-Channel Analysis of Cryptographically Secured Devices

Electromagnetic (EM) side-channel analysis has emerged as a significant threat to cryptographically secured devices,...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Windows File Explorer Vulnerability Enables Network Spoofing Attacks: PoC Released

A critical vulnerability in Windows File Explorer has been discovered, allowing attackers to capture...

CISA Issues Security Warning on Fortinet FortiOS Authentication Bypass Exploit

The Cybersecurity and Infrastructure Security Agency (CISA) issued a critical security warning regarding a...

Fake Coinbase Migration Messages Target Users to Steal Wallet Credentials

A sophisticated phishing campaign is currently targeting cryptocurrency investors with fraudulent emails claiming to...