Dissecting 2021’s ransomware attacks

Shady hooded figure - falling victim to ransomware attacks
(Image credit: TheDigitalArtist / Pixabay)

It has been impossible to ignore the recent wave of ransomware attacks. The assaults are not only creating headaches for victims but are, in many cases, causing huge problems for society – with schools being closed, healthcare facilities crippled and energy supplies cut off.

About the author

Cliff Martin is Cyber Incident Responder at IT Governance.

The crisis hit new lows earlier this year when devastating attacks occurred on both sides of the Atlantic. First, attackers compromised Colonial Pipeline, compromising gasoline supplies for millions of Americans. Days later, another group targeted Ireland’s health service, the HSE (Health Service Executive), putting people’s lives at risk.

But as extraordinary as these attacks are, they are only the tip of the iceberg. An IT Governance report found that ransomware accounted for almost one in three publicly disclosed cybersecurity incidents in Q1 2021 – and in June alone, there were 35 cases.

When you factor in all the organizations that fall victim and hide behind the vague language of ‘IT disruption’, you begin to get a picture of how extensive the threat is.

But what can organizations do to address the risk? To answer that, we must first understand how organizations are falling victim.

What can we learn from the Colonial Pipeline and HSE attacks?

The recent attacks on Colonial Pipeline and the HSE are perfect case studies on the current ransomware epidemic. They are both quintessential targets, providing essential services that can scarcely afford delays – yet neither was prepared for the attack.

The only exceptional thing about these attacks is that the criminals picked out both targets deliberately, because they foresaw the chaos that it would cause. But in most cases, attackers look for known weaknesses and then find organizations that can be exploited. Although some sectors are more likely to fall victim, everyone is at risk. No one can say that “we’re too small to be on attackers’ radars” or “we don’t have anything worth stealing”.

Attackers will launch the attack and deal with the consequences later. This is no clearer than in the aftermath of the Colonial Pipeline attack, which not only caused huge disruption but led to speculation that it was a targeted attack from Russia.

Responding to the suggestions, the attackers said: “Our goal is to make money and not creating [sic] problems for society.”

It’s hard to imagine that the crooks had no idea of the damage they’d cause, but it’s equally easy to see that this was just one more project for them.

They had infiltrated Colonial Pipeline’s systems some time before unleashing the malware. During that period, they launched anti-forensics to help them move through the organization's system undetected, deleting backups and exploiting weak permissions. By the time the ransomware began encrypting files, the attackers had ensured that there was little Colonial Pipeline could do to prevent a major breach.

However, what caused the most damage was something Colonial Pipeline did itself: shutting down its operational technology network.

It was a necessary move, given that there was a good chance that it too would be infected, but it also meant that the organization could no longer control the pipeline – leading to gasoline shortages and widely circulated images of people hoarding petrol with buckets, plastic bags and other unsafe receptacles.

The HSE incident

The HSE incident played out similarly, with the attackers bypassing the organization's defenses and forcing the IT management team to switch off operational systems to prevent further damage.

After days of disruption, the HSE received a stroke of luck. Perhaps unaware of the life-threatening consequences their attack would have, the ransomware group holding them hostage handed over the decryption keys for free.

It wasn’t all good news, though. The attackers said that it would still sell or publish the stolen data if the HSE refused to pay up.

This is something that organizations should be wary of, because there’s no guarantee that once the attackers won’t sell the data even once they’ve received the payment.

It also leaves the organization open to the possibility that the attacker (or a different group) breaks in again and demands another ransom.

That explains why the HSE stated that it wouldn’t negotiate. The organization acknowledged that there will be huge damage when the data is sold, but paying up doesn’t do anything to mitigate that.

Colonial Pipeline initially took the same approach, but eventually relented, handing over $4.4 million in bitcoin.

Protecting your organization

According to the cyber security company Emisoft, ransomware attacks cost organizations at least $42 billion (£30 billion) in business interruption and in ransom payment last year – although it says the true cost may be as high as £122 billion.

That’s because there are other long-term effects that are harder to quantify. For example, breached organizations will probably suffer reputational damage and face the expense of rebuilding the damaged systems once they’re back online. So, as expensive as it is to address the threat of ransomware, you should think about the cost of not doing so.

Technological defenses should be the first thing you look at. Endpoint protection and internal network segregation are great places to start, but you shouldn’t ignore simple solutions, such as spam filters.

According to F-Secure, 94% of ransomware is delivered by email, so if you can prevent those messages from reaching your employees, you will go a long way to protecting your organization.

But you can’t rely on those filters being one hundred percent effective, as attackers are always looking for ways to outsmart your defenses. That’s why you should also train your staff on how to detect and respond to suspicious messages.

Similarly, you should ensure that you have processes to help you respond to suspicious activity. For example, do you have an incident response plan to help you react promptly? And do your employees know what’s expected of them in an emergency?

Knowing how to respond is the key to protecting your organization. The more you can do to prepare, the better equipped you will be to prevent an attack and respond effectively when disaster strikes.

TOPICS
Cliff Martin

Cliff Martin is Cyber Incident Responder at IT Governance.

Read more
Hack The Box crisis simulation event
“Everyone will experience a hack” - how incident response can protect your organization
A computer being guarded by cybersecurity.
The impact of the cyber insurance industry in resilience against ransomware
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
Don’t let holidays be your cybersecurity downfall
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Hands typing on a keyboard surrounded by security icons
35 years on: The history and evolution of ransomware
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)