Close Menu
  • Home
  • Higher ED
  • News
  • Regulations
    • U.S. State Privacy Legislation
    • General Data Protection Regulation
    • New York Privacy Act
    • California Privacy Rights Act/California Consumer Privacy Act
  • AI
    • AI – Info Tech News
    • Fordham Artificial Intelligence for Faculty and Staff
    • How Emory University Accelerated AI Research in the Cloud
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Facebook X (Twitter) Instagram
Trending
  • U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor
  • Beyond Goodbye: Safeguarding Employee Data Privacy After Death
  • AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk
  • Are You Ready for Web 3?
  • Stay Ahead of Scammers in 2025
  • What are VPNs?
  • LinkedIn Accused of Using Private Messages to Train AI Models
  • Your Data, Your Decision: How to Control Your Data Privacy
Facebook X (Twitter) Instagram
Privacy at Fordham University
  • Home
  • Higher ED

    Strengthening Website Security in Higher Education: Lessons from the FTC’s GoDaddy Settlement

    January 21, 2025

    Merging AI Innovation with IT Expertise in Risk Management

    January 6, 2025

    Staff Highlight – Marc Herzog

    January 3, 2025

    Staff Highlight – Shannon Ortiz

    January 2, 2025

    AI Guidance in Schools

    October 4, 2024
  • News
  • Regulations
    1. U.S. State Privacy Legislation
    2. General Data Protection Regulation
    3. New York Privacy Act
    4. California Privacy Rights Act/California Consumer Privacy Act
    Featured

    Reauthorized Section 702 of the Foreign Intelligence Surveillance Act

    By Josephine Law, FIP, CIPP/US, CIPMApril 22, 20242 Mins Read
    Recent

    U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

    February 21, 2025

    Beyond Goodbye: Safeguarding Employee Data Privacy After Death

    February 19, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • AI
    1. AI – Info Tech News
    2. Fordham Artificial Intelligence for Faculty and Staff
    3. How Emory University Accelerated AI Research in the Cloud
    Featured

    Merging AI Innovation with IT Expertise in Risk Management

    By Josephine Law, FIP, CIPP/US, CIPMJanuary 6, 20251 Min Read
    Recent

    AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

    February 19, 2025

    LinkedIn Accused of Using Private Messages to Train AI Models

    January 30, 2025

    Opt-In or Opt-Out, Does it Matter?

    January 20, 2025
  • Secure IT News
  • Info Tech News
  • Resources
    • Privacy Glossary of Terms
    • Privacy Policy
    • Your Privacy Questions Answered
    • NIST Privacy Framework
    • US State Privacy Legislation Tracker
    • Safeguarding Data and Student Privacy: A Handbook for Higher Education
    • Privacy Field Guides
    • Access Now Blog
    • Fordham CLIP
  • About
Privacy at Fordham University
You are at:Home»News»Cybersecurity Alert: Risks of Abandoned Websites
News

Cybersecurity Alert: Risks of Abandoned Websites

Laura SuarezBy Laura SuarezJanuary 17, 2025Updated:January 17, 2025No Comments3 Mins Read
Cybercrimal using a key to obtain data not meant for them.
Share
Facebook Twitter LinkedIn Pinterest Copy Link

A recent report from cybersecurity company watchTowr Labs revealed an alarming way that hackers exploit outdated systems: by taking control of abandoned websites.1 Their research showed that more than 4,000 hacked systems, including those belonging to governments, universities, and businesses, were still trying to communicate with these expired websites, which hackers once used to control compromised systems. This discovery highlights the ongoing risks posed by forgotten digital infrastructure and what we can do to protect ourselves.

Breaking Down the Findings

The report detailed how watchTowr Labs acquired over 40 expired website domains for just $20 each. These websites had previously been used by hackers as command-and-control servers, which are systems designed to send instructions to hacked devices or collect stolen data. When the domains expired, watchTowr Labs purchased them and observed the activity of compromised systems that were still trying to connect.

The compromised systems included government entities, academic institutions, and private companies. Many of these systems had backdoors installed, which are hidden pathways that allow attackers to regain access whenever they want. Some backdoors were simple tools that enabled hackers to execute basic commands, while others were advanced programs capable of stealing data, brute-forcing passwords, and even removing themselves to evade detection. The researchers also discovered that some of these backdoors contained vulnerabilities, meaning hackers unknowingly created tools that could be exploited by other attackers.

This isn’t just a problem for businesses or foreign governments; universities are common targets for cyberattacks. The report identified compromised systems belonging to academic institutions in China, South Korea, and Thailand, highlighting how educational networks, with their large number of users and devices, can be exploited.

What This Means for Students

While this specific incident didn’t target Fordham University, the findings highlight how similar vulnerabilities could impact any university, including ours. Large networks like those at universities are especially vulnerable to cyberattacks because of the variety of users and devices connected to them. Here’s how you could be affected:

  • Compromised Devices – If hackers can install backdoors on personal or university-owned devices, they can access sensitive data like personal information, academic records, or research.
  • Targeted Phishing Campaigns – Hackers often use phishing emails to install backdoors. Clicking a suspicious link could lead to your devices being compromised.
  • Impact on University Services – Compromised systems can lead to disruptions in university operations, such as delayed access to email, course materials, etc.

How Can You Protect Yourself?

  • Be Cautious with Emails – Always be wary of unexpected emails, especially those asking you to click links or download files. If you suspect an email is phishing, report it using the PhishAlarm tool in your Gmail inbox. It’s an icon on the right side of your screen that looks like a hook with an envelope. This tool not only removes the email from your inbox but also alerts the university’s cybersecurity team.
  • Stay Updated – Keep your devices updated with the latest software and security patches. Outdated systems are easier for hackers to exploit.
  • Use University IT Services – If you experience a technical issue or suspect your account or device has been compromised, contact the IT Service Desk immediately:
    • Call 718-817-3999 anytime.
    • Email HelpIT@Fordham.edu or visit the Tech Help portal through My Pages on Fordham’s website.

  1. Lakshmanan, Ravie. “Expired Domains Allowed Control Over 4,000 Backdoors on Compromised Systems.” The Hacker News. 13 Jan. 2025, https://thehackernews.com/2025/01/expired-domains-allowed-control-over.html ↩︎

news privacy Security
Laura Suarez

Laura specializes in forensic analysis and the intersection of cybersecurity with law and justice. She holds a Bachelors in Mathematics and Computer Science, as well as a Masters in Cybersecurity expected in May. Drawing on her experience across various government sectors, Laura focuses on cybersecurity to support law enforcement efforts in combating cybercrime.

Related Posts

U.S. Lawmakers Push Back Against UK’s Demand for an Apple Encryption Backdoor

February 21, 2025

Beyond Goodbye: Safeguarding Employee Data Privacy After Death

February 19, 2025

AI Notetakers in Meetings: Balancing Efficiency with Privacy and Risk

February 19, 2025
Privacy
  • Data Privacy FAQs
  • Your Privacy Questions Answered
  • Visions of Privacy
Search
Categories
  • AI (77)
  • CCPA (9)
  • GDPR (20)
  • Higher ED (25)
  • New Jersey Privacy (2)
  • New Jersey Privacy Law (2)
  • New York Privacy Act (7)
  • News (187)
  • Privacy (173)
  • Regulations (65)
Archives

Fordham University - The Jesuit University of New York

Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.
Copyright © Fordham University
Facebook X (Twitter) Instagram YouTube LinkedIn
© 2025 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.