Arlington Chamber of Commerce issued the following announcement on Sept. 15
During the pandemic a parallel threat began permeating, driven partially by COVID itself. Ransomware attacks have increased exponentially over the last year and a half, impacting businesses of every size and profile. Yet, many companies believe it won’t happen to their business. For every Colonial Pipeline on the news there are thousands of small-to-medium enterprises impacted. Many of these go unreported.
Ransomware is not new. Some of the earliest iterations of ransomware attacks occurred as far back as the 1980s, using floppy disks and money orders. In the early 2000s it shifted to internet-based attacks and gift cards. Ransomware evolved and accelerated around 2010 with the advent of cryptocurrency. This afforded the attackers ease of transacting, anonymity, and was devoid of regulatory oversight. As ransoms went up, the frequency of attacks also increased. The latest surge has been impacted by the reduced sophistication required to carry out attacks, and the COVID remote work model. Because of this, remote workers will be the main target of cybercriminals throughout 2021 (Security Magazine, 2020.)
Today, Executing ransomware requires very little technical aptitude. A would-be attacker only needs the capability to access the dark web, where one can buy stolen network access from any number of businesses and then license ransomware deployment capability from Ransomware-as-a-Service platforms. The attack surface of victims is also plentiful, as many companies set-up remote access to provide systems connectivity to remote workers without proper security controls.
As a ransomware negotiator, I have had the bittersweet job of being in the middle of these attacks. My team and I are brought in post-attack to help businesses assess the business impact and understand the adversary, so that the impacted business can decide whether to engage with the ransomware operator. Should the business decide to do so, myself and my team act as a liaison, assisting with the negotiation, compliance, and settlement. While we have worked with some of the largest, newsworthy companies, it is the small-to-medium enterprises that concern me the most, as those businesses’ ability to recover from the operational, public relations, and breach fines are minimal.
No matter the size of your organization, ransomware is a threat that should be taken seriously. For example, in 2019, nearly 56% of organizations across multiple industries reported a ransomware attack (CISO Magazine). The time and resources spent focused on prevention and response, will pay back dividends when the unfortunate event occurs.
We have taken inventory of how the threat actors gain access in each of our cases and unsurprisingly it can be distilled down to a short list of cyber hygiene items. Chief among them, are securing remote access and better password and corporate credential policy. The majority of successful attacks are reused corporate credentials and passwords found on the dark web, and used to login to the remote access systems. Simply shutting off or securing Remote Desktop Protocol (RDP), Virtual Private Networking (VPN) devices, enforcing a strict password and credential policy, and enabling Multi-Factor Authentication (MFA) wherever supported, will significantly reduce the risk of becoming a victim. Monitoring dark web activity for your business’ critical data and intellectual property is a good measure, too.
When an attack is successful it can be a very chaotic experience. Systems are down, staff cannot login, email is inaccessible. We have found that most companies, even those who have documented incident response plans, are not fully prepared for the impact of a ransomware event. While traditional incident response plays a role in a ransomware event, there are many attributes that are unique to this kind of attack. The operational disruption, loss of revenue due to downed systems, inability to invoice, pay employees, etc., creates an atmosphere of panic and haste.
Do not.
First, do not attempt to repair, rename files or shut down systems, as this activity can often corrupt the encrypted files. Do not attempt to contact the threat actor directly. This should only be done when the business decision has been made to proceed with engagement and negotiation.
Do.
Use a professional negotiator. Traditional incident response should be enacted immediately to ensure the threat actors no longer have access to the network.
Having a documented process in advance of the attack will ease the navigation of the event. In addition to traditional incident response items, typically technical in nature, a ransomware response plan requires significant business process documentation. These would include a decision team, a team lead, financial stakeholders (who is going to approve the wire to the crypto broker?), technical leadership who can assess the impact and whether systems can be restored in a timely manner, legal counsel for breach notification, and so on.
Prevention, and preparation will go miles to mitigating and easing the impact of a ransomware attack. For reference, you can obtain our ransomware negotiation guide here https://www.groupsense.io/ransomware-negotiation-guide. For guidance on ransomware look at the CISA ransomware information site https://www.cisa.gov/stopransomware or talk to your external breach counsel.
Original source can be found here.