Dissecting 2021’s ransomware attacks
How organizations fall victim to ransomware attacks
It has been impossible to ignore the recent wave of ransomware attacks. The assaults are not only creating headaches for victims but are, in many cases, causing huge problems for society – with schools being closed, healthcare facilities crippled and energy supplies cut off.
Cliff Martin is Cyber Incident Responder at IT Governance.
The crisis hit new lows earlier this year when devastating attacks occurred on both sides of the Atlantic. First, attackers compromised Colonial Pipeline, compromising gasoline supplies for millions of Americans. Days later, another group targeted Ireland’s health service, the HSE (Health Service Executive), putting people’s lives at risk.
But as extraordinary as these attacks are, they are only the tip of the iceberg. An IT Governance report found that ransomware accounted for almost one in three publicly disclosed cybersecurity incidents in Q1 2021 – and in June alone, there were 35 cases.
When you factor in all the organizations that fall victim and hide behind the vague language of ‘IT disruption’, you begin to get a picture of how extensive the threat is.
But what can organizations do to address the risk? To answer that, we must first understand how organizations are falling victim.
What can we learn from the Colonial Pipeline and HSE attacks?
The recent attacks on Colonial Pipeline and the HSE are perfect case studies on the current ransomware epidemic. They are both quintessential targets, providing essential services that can scarcely afford delays – yet neither was prepared for the attack.
The only exceptional thing about these attacks is that the criminals picked out both targets deliberately, because they foresaw the chaos that it would cause. But in most cases, attackers look for known weaknesses and then find organizations that can be exploited. Although some sectors are more likely to fall victim, everyone is at risk. No one can say that “we’re too small to be on attackers’ radars” or “we don’t have anything worth stealing”.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
Attackers will launch the attack and deal with the consequences later. This is no clearer than in the aftermath of the Colonial Pipeline attack, which not only caused huge disruption but led to speculation that it was a targeted attack from Russia.
Responding to the suggestions, the attackers said: “Our goal is to make money and not creating [sic] problems for society.”
It’s hard to imagine that the crooks had no idea of the damage they’d cause, but it’s equally easy to see that this was just one more project for them.
They had infiltrated Colonial Pipeline’s systems some time before unleashing the malware. During that period, they launched anti-forensics to help them move through the organization's system undetected, deleting backups and exploiting weak permissions. By the time the ransomware began encrypting files, the attackers had ensured that there was little Colonial Pipeline could do to prevent a major breach.
However, what caused the most damage was something Colonial Pipeline did itself: shutting down its operational technology network.
It was a necessary move, given that there was a good chance that it too would be infected, but it also meant that the organization could no longer control the pipeline – leading to gasoline shortages and widely circulated images of people hoarding petrol with buckets, plastic bags and other unsafe receptacles.
The HSE incident
The HSE incident played out similarly, with the attackers bypassing the organization's defenses and forcing the IT management team to switch off operational systems to prevent further damage.
After days of disruption, the HSE received a stroke of luck. Perhaps unaware of the life-threatening consequences their attack would have, the ransomware group holding them hostage handed over the decryption keys for free.
It wasn’t all good news, though. The attackers said that it would still sell or publish the stolen data if the HSE refused to pay up.
This is something that organizations should be wary of, because there’s no guarantee that once the attackers won’t sell the data even once they’ve received the payment.
It also leaves the organization open to the possibility that the attacker (or a different group) breaks in again and demands another ransom.
That explains why the HSE stated that it wouldn’t negotiate. The organization acknowledged that there will be huge damage when the data is sold, but paying up doesn’t do anything to mitigate that.
Colonial Pipeline initially took the same approach, but eventually relented, handing over $4.4 million in bitcoin.
Protecting your organization
According to the cyber security company Emisoft, ransomware attacks cost organizations at least $42 billion (£30 billion) in business interruption and in ransom payment last year – although it says the true cost may be as high as £122 billion.
That’s because there are other long-term effects that are harder to quantify. For example, breached organizations will probably suffer reputational damage and face the expense of rebuilding the damaged systems once they’re back online. So, as expensive as it is to address the threat of ransomware, you should think about the cost of not doing so.
Technological defenses should be the first thing you look at. Endpoint protection and internal network segregation are great places to start, but you shouldn’t ignore simple solutions, such as spam filters.
According to F-Secure, 94% of ransomware is delivered by email, so if you can prevent those messages from reaching your employees, you will go a long way to protecting your organization.
But you can’t rely on those filters being one hundred percent effective, as attackers are always looking for ways to outsmart your defenses. That’s why you should also train your staff on how to detect and respond to suspicious messages.
Similarly, you should ensure that you have processes to help you respond to suspicious activity. For example, do you have an incident response plan to help you react promptly? And do your employees know what’s expected of them in an emergency?
Knowing how to respond is the key to protecting your organization. The more you can do to prepare, the better equipped you will be to prevent an attack and respond effectively when disaster strikes.
- We feature the best firewall.
Cliff Martin is Cyber Incident Responder at IT Governance.