³Ô¹ÏÍøÕ¾

Computer Security: Tele-protect

The coronavirus has brought normal life at CERN to a well-justified halt, but it also has the potential to shut down CERN’s digital operations. The only infection vectors a “digital” coronavirus would need is human gossip (creating “FUD” – fear, uncertainty and doubt), fast-clicking users, unpatched computers… and teleworking! And an adversary to give it a try.

In fact, as we outlined in our previous Bulletin article on ransomware (““, with more details on this in the next Bulletin issue), attackers are on the prowl to maliciously infiltrate companies and enterprises, but also universities and academic institutes. Just recently, in the midst of handling COVID-19 patients. While there are no details of this incident yet, here is a roadmap for how CERN could end up in the emergency ward:

Step 1 – F-U-D: Fake messages on the subject of COVID-19 trouble not only our minds, but malicious e-mails, WhatsApp messages or the like on the subject could also threaten the security of your computer. Lots of the embedded links being shared point to allegedly new research results, infection statistics, help pages and advisories, on how you can best protect yourself. Not all of them are benign: some intentionally target your computer. So coronavirus is a vehicle for infecting your computer too. And given all the fear, uncertainty and doubt around this subject, human curiosity acts quickly… click!

Step 2 – An unpatched computer: One click on a malicious link is sufficient to infect your computer. And this is almost guaranteed to happen if your computer is running an outdated operating system like Windows 7 (or earlier!) or an unpatched version of Windows, Linux or MacOS. Less likely, but still possible, your computer might be fully up-to-date but your operating system still exposed to a yet-to-be-published vulnerability. Once your computer is compromised, the adversary has access to all its features: keyboard, hard disk, microphone, camera… infect!

Step 3 – Teleworking: The (hopefully short) era of socio-physical distancing to reduce the spread of the coronavirus requires more teleworking than ever before. Teleworking involves using your CERN or home computer to remotely connect to CERN. This means that, at one moment or another, you will have to type your CERN password. And with a compromised computer, the attacker can watch every step you take: which program you execute, which data you manipulate, which system you manage, which maintenance work you perform, which password you type. Enough information to impersonate you. Abuse your computer program. Steal your data. Compromise your system. Sabotage your maintenance work. Steal your passwords… game over!

This is how organisations have been brought to a halt in the past. And this is how coronavirus could bring organisations into the emergency ward too. .

So, what can you do to protect yourself, your computer and CERN?

Step 1 – STOP – THINK – DON’T CLICK: Just try to restrain your curiosity and do not fall prey to all the gossip circulating at the moment. Be cautious, and don’t click on links from dubious or not-so-dubious sources. This includes web pages offering “” on Covid-19, forwarded malicious WhatsApp messages, mails, etc.

Step 2 – Patch: Keep your computer up-to-date. CERN-managed PCs already should be. For your own devices, enable if this is not your default. If your operating system or applications are outdated and not supported anymore, stop using them and upgrade to a version that is actively supported by the software vendor. Be ready to scrap it any time.

Step 3 – Connect securely: There are several official and secure methods to allow you to , to and to into CERN. Please do not use any other means! In particular, do not abuse any firewall opening assigned to your dedicated service and do not create web proxies for tunneling through. If this puts the Organization at risk, it will be considered as professional misconduct. Finally, in order to better protect your password, the IT department is still aiming to roll out for especially exposed CERN staff and users.

For more good advice on how to telework securely, please check out and join in the discussion with your CERN peers on . Thanks a lot for protecting CERN.

Good luck and the best of health to you, your family and friends!

_____

/Public Release. View in full .