There have been a lot of changes in ransomware over time. We want to help you protect your organisation from this growing attack trend.
The Colonial Pipeline ransomware attack is just part of a new onslaught of ransomware attacks that malicious actors are ramping up against high value victims. Why are we seeing this?
These malicious actors are after extortion money, and as such they are looking to target organisations that are more likely to pay if they can disrupt their business operations. In the past we saw this with targeting of government and education victims. The more pain that these actors can cause an organisation, the more likely they will receive an extortion payment.
Ransomware attacks have gone through many iterations and we’re now seeing phase 4 of these types of attacks. To give you context, here are the four phases of ransomware:
- 1st phase: Just ransomware, encrypt the files and then drop the ransom note … wait for the payment in bitcoin.
- 2nd phase: Double extortion. Phase 1 + data exfil and threaten for data release. Maze was the first document to do this and the other threat actor groups followed suit
- 3rd phase: Triple extortion. Phase 1 + Phase 2 and threaten for DDoS. Avaddon was the first documented to do this
- 4th phase: Quadruple extortion. Phase 1 + (possibly Phase 2 or Phase 3) + directly emailing affected victim’s customer base. Cl0p was first documented doing this, as written by Brian Krebs
The majority of the time now we’re seeing a double extortion model, but the main shift we’re now seeing is the targeting of critical business systems. In this latest case, it does not appear that OT systems were affected but the IT systems associated with the network were likely targeted.
That may change though as many organisations have an OT network that is critical to their operations and could become a target. In this blog post we highlighted how manufacturers are being targeted with modern ransomware and the associated impact.
Taking down the systems that run an organisation’s day-to-day business operations can cause financial and reputation damage.
But there could also be unintended consequences of going after victims that are too high profile, and this latest might be one example of this. Bringing down a major piece of critical infrastructure for a nation, even if the motive is only financial gain, might incur major actions against the actors behind this attack. So in the future, malicious actors may need to assess the potential ramifications of their target victim and decide if it makes good business sense to commence with an attack.
We will continue to see ransomware used in the future, and as such organisations need to take the time to put in place an incident response plan focused on the new model of ransomware attacks. Some things to think about as you go about this:
- Understand that you will be a target. Every business can likely be on the radar of malicious actors, but those in critical infrastructure need to assess the likelihood of becoming a victim now.
- Dedicated attackers will find a way into your network. Access as a Service (usually where another group performs the initial access and sells it to another group) is used regularly now, and whether via a phished employee, a vulnerable system open to the internet, or using a supply chain attack, the criminals will likely find a way in.
- The malicious use of legitimate tools are a preferred tactic used across the entire attack lifecycle. Check out our recent blog on this topic.
- Your key administrator and application account credentials will be targeted.
- Ransomware actors will look to exfiltrate data to be used in the double extortion model.
- The ransomware component will be the last option in their malicious activities as it is the most visible part of the attack lifecycle and as such you will then know you’ve been compromised.
For those organisations who have OT networks some key things to think about:
- Understand your risk if your OT network is taken offline
- Build a security model that protects the devices within the OT network, especially those that cannot support a security agent
- Network segmentation is critical
- If your OT network needs to be taken offline due to the IT network being compromised, you need to identify how to overcome this limitation
This latest attack is another call to action for all organisations to harden their networks against attacks and improve their visibility that malicious actors are in your network. Trend Micro has a multi-layered cybersecurity platform that can help improve your detection and response against the latest ransomware attacks and improve your visibility. Check out our Trend Micro Vision One platform or give us a call to discuss how we can help.