Ransomware
Yet again, we can't say we weren't warned. The ransomware attack that shut down Colonial Pipeline's 5,500 mile-long fuel supply infrastructure is just the latest in a pandemic of such incidents. Perhaps it will result in the threat of ransomware being taken seriously - and a renewed focus on security fundamentals. Frankly, if the extraordinary pictures of Americans filling plastic bags with gasoline don't focus policymakers' minds, then nothing else will. Bloomberg reports that Colonial paid almost $5 million to restore its operations, despite earlier denials that any ransom would be paid.
It's tempting to ascribe the attack to a group with connections to the Russian government, but President Biden says this isn't so. It's true there's evidence that the attackers may be based in Russia or have Russian connections, but most analysts agree the aim was not to damage national infrastructure and simply to target an organisation with the means to pay a significant ransom. Of course, Moscow might not be unhappy about the past week's events, will certainly have studied them and most probably could have prevented them with a more muscular approach to cracking down on digital crime. The Biden administration says "decisive action" against ransomware networks will be taken.
The FBI has formally blamed the attack on a criminal group called DarkSide, but it's entirely possible it didn't carry out the Colonial Pipeline attack itself. As we (and many others) have frequently warned, there is a large and growing market for Ransomware as a Service (RaaS). This allows anyone with criminal inclinations to take advantage of others'
technical skills - and share the profits of any successful attacks with them. It is all too easy to set oneself up as a 'cyber criminal', despite some recent successes against the organised crime groups behind many incidents.
For organisations hit by ransomware, the choice is whether or not to pay. Attackers have adapted their methods to make payment more likely by not only encrypting information, but also by threatening to publish it if they don't get their money. The choice has been made somewhat easier because in many cases the ransom is paid by insurance companies. Of course, this only encourages the criminals, and governments (including the UK's) are urging organisations not to pay up. The Associated Press says insurance giant, AXA, has acceded to French government demands and will no longer reimburse ransomware payments.
And finally...Ireland's health service has suffered a ransomware attack that has forced it to take its systems offline as a "precaution".