Friday, March 31 2023

In order to understand how state and local government agencies can fall victim to such a devastating attack, one only needs to look at the IT budget the governments are operating with, its IT staff and backup recovery plans. As it turns out, Baltimore City’s IT budget is twice as less as other major cities in the United States. On top of that, four Chief Information Officers were fired from their positions over a period of five years indicating internal issues with operational management. To top it off, not all systems had backup ready in place or a disaster recovery plan for a ransomware attack

Baltimore ‘Robinhood’ ransomware attack is sure to teach many an age-old lesson, if you don’t invest in your cyber security and IT infrastructure willingly, you will be forced to incur huge monetary losses and end up having to double the budget. This incident occurred for many reasons, the negative effects are beyond what we used to encounter, and it would not be fair to say that the entire blame is that of the City’s. However, not having a decent budget for a network intrusion prevention system and other more sophisticated security tools that could have stopped the attack in its infancy is not justifiable. Having poor backup practices and no disaster recovery plan for the ransomware attack, even though you incurred one just a few months ago, is also problematic and unjustifiable. If only the last were untrue, the city could have been back up and running with far less monetary loss than it is presented with today.

Another proof that ransomware is still alive and well is the severe attack on an aluminum giant Norsk Hydro which crippled its operations worldwide in the beginning of March. On the adjacent continent in Oslo, Norway, the Norsk Hydro has been attacked by a crypto-locking ransomware and disrupted major business areas on a global scale. Norsk operates in more than 50 countries and has an enormous infrastructure and network under its control.

The situation at Norsk was quite severe as the global network had to be shut down offline while the remediation and mitigation process took place. The affected production plants were isolated from the rest of the global network in an effort to contain further spreading and damage.

The total monetary loss for Norsk combined over the period of time it took to get the operations back and running fully was $ 51 million. The reason for the very high sum is that Norsk employs over 35.000 people globally and deals with heavy metal production.

In the case of Norsk, a specific new strain of ransomware called LockerGoga is what hit their networks and infrastructure so hard. After gaining access into the system, the attackers leveraged the Active Directory and Group Policy to spread the virus. The attackers moved laterally to gain domain admin rights in order to push the encryption virus across the network.

In this case, Norsk was praised regarding their incident response as being very effective. The company was able to execute one of the best incident response plans seen and mitigate the virus as soon as possible. Without adequate cyber security staff and the coordination of the global IT departments, along with strict procedures in place of a disaster such as this, the attack would have caused far more monetary loss than it did.

However multiple things could have been done in advance in order to stop the virus from spreading to the extent it did. Norsk infrastructure could have been hardened using a least privilege approach to help with the lateral spread and additionally isolated by separating its critical systems from each other. Additionally, many industrial control systems are at the end of life but are still being used, with the problem being that patches no longer exist for those systems making them more susceptible to attacks.

To sum up this incident, Norsk didn’t follow some basic best security practices as they didn’t perceive the Active Directory to be a possible vector of a ransomware attack. Attackers are increasingly performing targeted attacks in order to up their chances of success and are getting far more creative in their efforts. Accent should be given on all best practices and patches should be applied regularly.

Ransomware – Cyber Security
Previous

Ransomware is here to stay in 2020- 1/2

Next

Cyber Response Plan for Cyber Security – Need of the Hour - 1/4

Check Also

Widget

Don’t Miss

Cyber Executive Moves: Netizen, Kroll, Coalfire

Julia Bischoff

Netizen hires Joe Carr as director of cybersecurity, and Krebs Stamos Group names new chief information security officer. Netizen, a veteran-owned cybersecurity solutions provider, named Joe Carr as director of cybersecurity. Carr held many different positions before Netizen, including overseeing acquisition programs for the United States military.  Krebs Stamos Group, a technology risk insights provider, […]

Cyber Deals: Opscura, Acceldata, and Sensiguard Acquisition

Austin Boland-Ferguson

Cybersecurity venture funding activity and mergers and acquisitions: This week’s most sizable deals included emergency and healthcare security service providers. Funding Industrial control system (ICS) cybersecurity provider Opscura Inc. received $9.4 million in Series A funding, which will help the Spain-based company with US expansion. Tenable’s corporate venture capital arm led a $7 million seed […]

Cyber Executive Moves: Appgate, Trellix, Rubrik

Julia Bischoff

Appgate appoints a new CEO, Trellix hires loanDepot’s CISO, SANS Institute taps new CISO director. Secure access solutions provider Appgate appointed Leo Taddeo as chief executive officer and president. Taddeo stepped into the new role after serving as Appgate’s chief information security officer since February of 2022. The SANS Institute, a cybersecurity training company, appointed […]

Cyber Deals: Drata, Field Effect investments, and Veracode acquisition

Julia Bischoff

Cybersecurity venture funding and merger activity: This week’s largest deals were MDR and security automation investments, as MSP consolidation continues to attract corporate buyers. Funding Cork, Ireland-based, data encryption company Valutree acquired $12.8 million in their series A funding round, led by investors Molten Ventures and Ten Eleven Ventures. Funds will be used to expand […]

Cyber Deals: Spin Technology, CyberArk, Mesh Security

James Hu

Cybersecurity Venture Funding and Mergers: This week’s deals involved cloud security services, data privacy, and industrial cybersecurity companies. Funding Cloud cybersecurity firm Mesh Security has secured $4.5 million in venture funding. The round was led by Booster Ventures with participation from other investors. Spin Technology, a firm providing SaaS security solutions, raised $16 million in […]

Cyber Deals: Cybrary, Ping Identity, Axio Global

James Hu

Cybersecurity Venture Funding and Mergers: Key investments were made in cybersecurity training, secure enterprise browser, and risk management companies. M&A activity this week involved identity security, zero trust, and threat intelligence firms. Funding Cybrary, a cybersecurity training platform, raised $25 million in a Series C funding round. The round was led by BuildGroup and Gula […]