Middlebury College is retiring the Bombay print server on August 3, 2015, as it is incompatible with our current 64-bit operating systems. Bombay has been replaced by a new print server named Walnut that has all of the same print queues on it.
ITS has worked with the majority of people who were connecting to the old server but if you have been away from campus you may experience an interruption in printing services until you move from Bombay to Walnut printers. If needed, refer to the steps below to restore printing. If you have any questions or need further assistance, please contact the Helpdesk at 802. 443.2200 or via email to firstname.lastname@example.org.
Steps for Windows 7 computers to move from Bombay to Walnut:
look for printers “on Bombay” print server name listed below queue name. Go to Start>Devices and Printers and look for entries that have “on Bombay” in the name, e.g. “LIB125F on Bombay”
Middlebury Information Security received information that fraudulent emails are being sent from a malicious domain, “middleburry.org”, to businesses that might provide equipment and supplies to Middlebury College.
The suspicious emails are crafted such that they appear to come from actual Middlebury College employees, though the contact information provided includes incorrect telephone numbers and email addresses.
Note that suspected bad actors are using a typosquatting technique – there are two R’s in “middleburry.org”, and Middlebury’s domain name ends in .edu, rather than .org. Those details, however, are perhaps an easy thing to miss, especially at a quick glance.
Efforts are underway to takedown the middleburry.org domain, and to suspend the domain holder’s email service.
Please contact InfoSec@middlebury.edu with questions.
A year ago the Internet saw a rash of malware known as ransomware. This malicious form of cyber attack is known for infecting a computer and encrypting a drive. The victim is then unable to recover their data until paying a ransom to the attacker. Middlebury, like many other institutions was not immune to this form of attack.
A week ago the FBI announced a new variant on a common form of these attacks known as CryptoWall. This form of ransomware is known to have four methods of infecting a computer.
Phishing: the attacker may lure a victim into downloading an infected attachment through a phishing campaign and thereby compromising the drive on their system.
Phishing: the attacker lures the victim into clicking on a link to a malicious web site where the victim unknowingly downloads the malicious software onto their system and compromises their drive.
Infected ad: the attacker posts and infected ad on a website which a user might click thereby causing the download of malicious software.
Compromised website: the attacker compromises a website so when a user visits the website they unknowingly download malicious software and compromise their system.
According to the FBI, by far the most common method of attack is phishing, particularly with attachments in the message.
What you can do to protect yourself:
Never open attachments or click links in emails that you do not recognize or trust.