Are You in the Ransomware Sweet Spot?

Over the July 4, 2021 weekend, the Russia-based REvil hacker group perpetrated a ransomware attack on Kaseya software. The software is used by managed service providers (MSPs) to operate their clients’ networks. This attack reportedly shut down 800-1,500 small-to-mid-size clients of around 50 Kaseya MSP customers.

The attack illustrates the evolution of ransomware. Historically, hackers penetrated systems and exfiltrated intellectual property and/or personal identifiable information, but now, attacks shut down operations altogether. In previous events, distribution might be affected, but paychecks still got cut. Or accounting was disrupted, but orders got filled. Today’s ransomware attacks yield more devastating effects, quickly and effectively halting business in its tracks.

Imagine a grocery chain experiencing a ransomware attack. Produce buyers can’t place orders online; instead, they’re calling vendors to keep stores stocked. Clerks report for work but their inoperative badges lock them out. Cash registers won’t open. The payables team resorts to manual payment operations. The ransomware perpetrator demands bitcoin: Has the organization pre-arranged an account to access bitcoins? Can the transfer be protected with an escrow account?

The ransomware sweet spot

Criminals find ransomware a good business to be in. They’re refining their approach. Rather than go after the biggest dollars, they now focus on prosperous mid-sized businesses whose networks are less secure than those of large multinationals with advanced cyber protection. This “sweet spot” encompasses organizations with the wherewithal to pay ransom, but who haven’t achieved full cyber resilience. These businesses may not have segregated networks, and process internal information systems technology on the same networks as their operational technology (OT), and older OT systems which are less secure and easier to penetrate. Recent ransomware victims have included oil pipeline operators Colonial Pipeline (which recovered a portion of the $5M ransom reportedly paid in May), and meat processor JBS (which reportedly paid $11M in June).

If an organization lacks appropriate defenses, bad actors will find a way to attack. Experience breeds innovation; tomorrow’s threats bypass today’s defenses. Businesses in the ransomware sweet spot can stay ahead of the curve, however. The approach has roots in business continuity and disaster recovery fundamentals and those fundamentals are extended to encompass anticipating ransomware attacks and responding to and recovering from them if they do occur.

In the past, a business would experience and respond to an attack by creating a team to fend it off. After the crisis, the business would take steps to recover. The approach was reactive in nature and ad hoc in execution. But as cybercriminals evolve ransomware methods, organizations need defenses that are always operating and available. Including secure data backups, held in off-site storage.

An active defense blocks prospective perpetrators

Businesses must anticipate threats and counter them with an active defense that blocks prospective perpetrators. Active defense calls for understanding the overall evolving threat landscape, identifying potential threats, software weaknesses and insufficient controls within the organization. Anticipation means tracking evolving threats actors constantly. Continuous monitoring reported attacks worldwide, industry-wide, and by business size enables leaders detect a potential attack as a component of a strong, timely defense. When businesses anticipate threats, they can execute predefined incident response plans and confidently respond and recover with fewer long-term impacts.

Crisis management plans provide an organization the ability to respond effectively – with direct countermeasures and well-considered contingency processes. Enterprise-wide crises like ransomware attacks call for a response that draws upon multiple disciplines. When under attack, new requirements arise suddenly from every business function. A crisis management plan addresses all questions that will arise during a ransomware attack. Specialists will contribute expertise in systems, law, human resources, supply chain, regulations, and other disciplines that the response will demand. New skills will be needed to evaluate threat severity – and the estimated losses. Plans must consider every aspect of managing the crisis while continuing operations.

With a good plan and an expert multidisciplinary response team, businesses can prevail over a ransomware attack. Recovery, however, requires additional activities to return verified working systems, without perpetrator presence. At this time, businesses will have unlocked their systems. They will have applied backups or retrieved data from the bad actors. Now, leaders will want to investigate – and address the aftermath.

Plan now for tomorrow’s threats

Paying ransom will not spare the enterprise other negative impacts. New expenses arise, disputes result, and regulations are inadvertently violated when ransomware disrupts operations. A thorough forensic evaluation will ensure every trace of malware is no longer present. and that data is returned to its original state and validated for integrity. Leaders will want to verify that financial reports are accurate.

Recovery is also an opportunity to reflect on what the business has experienced, to debrief with trading partners and other stakeholders. This is the time to capture every lesson – to make the business less susceptible to the next threat. Business leaders in the ransomware sweet spot can act now to fend off attacks like the ones suffered by Kaseya clients, Colonial Pipeline, and JBS. They can look within and outside their own organizations to assemble the specialists they need to anticipate, respond to, and recover from evolving ransomware threats.

As of July 30, the Kaseya website remains dark. On July 23, Kaseya announced they’d acquired a decryption tool so victims could restore the data encrypted by this attack. They’ve denied they paid ransom to acquire the tool. While several customers made some form of recovery, either with the tool or with hundreds of hours of their own work, others are still struggling. US officials aren’t commenting, and Russian officials are denying any knowledge of the situation. Clearly, there is more ransomware news to come.

To learn more about our ransomware advisory and recovery services, contact us.

Terry Jost

Managing Director
Security and Privacy

Subscribe to Topics

In this special #Identity at the Center #podcast episode, hosts Jim McDonald and Jeff Steadman talk with Andrew Shikiar, Executive Director of the #FIDO Alliance, about the upcoming Authenticate 2021 Conference. Listen now: http://ow.ly/kwnz50GbiHc

#AuthenticateSummit #IAM

#Identityaccessmanagement #governance is a key component to safeguarding #digital assets. For companies that rely on #SAP applications, establishing an SAP #IAM #centerofexcellence is essential for a clean #security and controls environment. Learn more: http://ow.ly/8ePw50GaxmO

#Ransomware threats have evolved beyond #data #encryption to data #theft and extortion that can #disrupt organizations. In this #webinar, we'll outline how to anticipate and respond to the threat environment facing organizations. Register now: http://ow.ly/sIUM50Ga70B

This Thursday! Protiviti experts will discuss best practices for migrating #AX2012 to #D365, illustrating the demand for efficiencies within the market to meet a growing requirement for optimized profit margins. Register now: http://ow.ly/ayzj50FTAne

#dynamics365 #dynamics365fo

Protiviti Managing Director Douglas Sellers spoke with @CFODive on how a good way to start reducing risk when choosing how to implement APIs is the API gateway. Read more: http://ow.ly/uU2I50G9FiL

Load More...