Media under siege
The new year began with attacks on media organisations in Portugal, Israel and Norway, continuing the trend seen in 2021. in Portugal, the Lapsus$ ransomware gang successfully attacked Impresa, the country's largest media conglomerate, took control of its networks and taunted it with idiotic tweets. In Israel, The Jerusalem Post's website was defaced, apparently to mark the second anniversary of the killing of the head of Iran's Revolutionary Guard. And last week, Norway's largest local news publisher was forced to shut down several systems including its printing presses.
These attacks are only going to continue, because they work. Whether driven by greed or politics, media organisations are irresistible targets because of their high public profiles which make them particularly attractive to ransomware gangs, although 'gangs' is a misleading term. Those responsible for such attacks are highly organised and operate just like any commercial company, with marketing, finance and support departments. In many cases, they don't carry out attacks themselves, but rent out their solutions in what's known as Ransomware as a Service.
So what should organisations do? Above all, make sure there is an effective backup policy which includes maintaining offline copies of essential data. That won't prevent the disruption caused by attacks - or the damage done if the information is leaked - but it will minimise the risk of data being lost altogether. Other measures include; ensuring systems and devices are up to date; changing default passwords; implementing multi-factor authentication; prohibiting email attachments containing executable files; and planning what to do in the event of an incident. Awareness training is also essential (see below). The UK National Cyber Security Centre has detailed advice.