Three cyberattack trends affecting higher education to look out for in 2025
Upendra Mardikar
EVP, Chief Information Security Officer at TIAA. Author, Advisor, Mentor
Security, administrative and academic leaders in higher education will need to focus on a wide range of cyberattacks in the coming year.
There are three notable trends to watch:
?
?
Higher ed leaders who effectively detect and prevent these three types of attacks will make significant progress in strengthening cybersecurity this year.
?
Cyberattack 1: Supply chains
?
In 2025, cybercriminals will increase the number of cyberattacks aimed at supply chain networks of vendors, suppliers, contractors and customers associated with colleges and universities. To a growing extent, cybercriminals are finding an abundance of “open doors” within supply chains to steal sensitive information and generate revenues.
?
Frequently, they start by attacking a third party in the supply chain to establish a foothold because these entities are often smaller in size and resources than colleges and universities. Once inside, they eventually go after the larger target -- the higher ed institution -- which has an abundance of sensitive employee and student data as well as intellectual property.
?
Tip: Conduct thorough due diligence on third-party suppliers with whom your institution shares its most sensitive data. Identify the cybersecurity controls they have in place and ensure they have widespread encryption, use multifactor authentication and require complex and long passwords. If you find your supply chain business collaborator unwilling to share enough information to satisfy the level of security risk you need, it might be best to stop sharing information and find a more cooperative vendor.
?
Cyberattack 2: More complex AI-driven cyberattacks
?
Nowadays, we can't have any conversation without talking about AI. It’s no surprise there will be more new types of cyberattacks than ever launched in 2025 that leverage the power of GenAI. Cybercriminals will use the technology to unleash a barrage of newly configured crimes, including AI-powered malware, AI chatbots, AI-fueled identity theft, AI-enabled web and voice-based attacks, and AI-generated phishing emails and text messages (vishing). It will be noticeable this year how much more convincing, harder to detect, higher in number and more automated these attacks will become.
?
Tip: Use GenAI to quickly and accurately detect these cyberattacks. Take advantage of the productivity benefits of AI automation to streamline cybersecurity tasks. The more you use AI to fight cyberattacks more efficiently, the more likely you are to bolster cybersecurity.
?
New types of AI-powered phishing cyberattacks
?
This year, you’ll notice cybercriminals are launching relatively new types of AI-fueled phishing attacks. One is called “hybrid phishing.” In this scenario, a bad actor will, for example, send an email to a higher education administrator or professor. The email will contain a phony bill from a well-known company that states the target victim was charged $1,000 (or other amount) for a recent purchase.
?
But that transaction never happened. In the email, there will be a sentence worded something like this: “If you had an issue with this charge, please call this phone number: xxx.” The ploy aims to lure target victims into placing a voice call?questioning the bill, then tricking them into releasing sensitive information such as a password.
领英推荐
?
Tip: If you get an email indicating you paid for something you’re not aware of and there’s a phone number included, don’t call the number and don’t respond to the email. That’s a red flag you actually received a hybrid phishing cyberattack.
?
Detecting deepfakes
?
Like 2024, GenAI-powered deepfakes will continue to be a major problem within higher education institutions this year. Deepfakes are created videos or audio recordings of someone doing or saying something that never happened. A deepfake aims to intentionally cause the target victim harm, often by stealing their sensitive personal credentials or coaxing them to click on a link that unleashes malicious software. The goal is often to disrupt or halt a victim’s computer network from functioning or impair several computers and networks across the university.
?
Be especially vigilant to spot audio deepfakes, which are becoming more widely used because they tend to be more difficult to detect than video deepfakes. Decision Market Research?finds that from?2024 through 2033, the annual global growth rate for voice deepfakes is projected to be 37.6% and will total $79 million this year.
?
Tip: If you receive a phone call unexpectedly from someone you know asking you to take some action urgently, stop. It’s probably an audio deepfake. If the person’s voice seems in any way odd in tone or not quite how they usually sound or speak, that’s a red flag you’re the target of a deepfake.
?
Cyberattack 3: Insider threats
?
Fueled in part by the growth in remote working, there will be more insider threats in 2025 that lead to cyberattacks against higher education. In one likely scenario, for instance, IT workers from North Korea pose as Chinese and Russian IT freelance contractors searching for remote-working job opportunities. Their aim could be to obtain employment under false identities in U.S.-based colleges and universities.
?
Operating as employee “insiders” in these organizations, they could likely steal sensitive data and/or money, demanding ransom payments from the college or university that hires them. These cybercriminals may be focused on stealing money or cryptocurrency along with gathering weapons of intelligence to fund North Korea’s military operations. Alternatively, these bad actors can steal the identities of legitimate U.S. citizens to become employees of colleges and universities to obtain sensitive information and benefit financially.
?
Tip: If you receive a job application from an IT worker claiming to be in China or Russia, be sure to do a thorough background check to verify the applicant is from China or Russia and not North Korea. For better transparency, an in-person or video interview should be required before hiring. Once hired, if the IT worker asks to use a personal laptop PC or won’t enable their video during a Zoom call, that’s a red flag it could be a cybercriminal.
?
Monitor employees’ online behaviors for abnormal activities such as multiple login attempts, unusual working hours and requests for privileged access to sensitive information.
?
Throughout the year, other major cybersecurity trends will be shared.
?
Question: What do you think are the three biggest cybersecurity trends to watch this year and why? Please include your thoughts in the comments section.
?
Director DevSecOps @ TIAA | CISSP | CCSP | AWS/AZURE Cloud Security| DevSecOps| Kubernetes Security
1 周Absolutely on point and amazing article....Need to equip ourselves to counter AI aided attacks... with AI assisted defence + AI assisted testing for resilience
Cyber Security | Risk Management | DevSecOps | ITIL Expert | IIM A
2 周Very insightful and thought provoking, as usual Upendra! I agree how simple things like encryption (both for data at rest and in motion) and MFA for third parties are overlooked by organisations! Needless to say AI use cases in Cyber Security are the need of the hour!
Senior Director @ TIAA | AWS, AI/ML, Big Data, Distributed Programming
3 周Great insights and very practical tips. Thanks for sharing Upendra Mardikar
Cloud & AI Technology Executive | Public Speaker | Academic Lecturer | Ex McKinsey & Co. and Amex
3 周Fantastic insights and actionable tips—thanks for sharing, Upendra! A must-read!
Passionate about Data and Machine Learning Platforms
3 周Thanks Upendra! Awesome tips!! Looking forward to future post!!!