Chapter 10

Prevention

Let’s think the unthinkable, let’s do the undoable. Let us prepare to grapple with the ineffable itself, and see if we may not eff it after all.

—Douglas Adams

Learning Objectives

  • Identify the keys to building an effective cybersecurity program

  • Describe key security technologies that can prevent initial entry

  • Learn techniques and strategies for catching cyberattackers early, before an incident metastasizes into cyber extortion

  • Know how to reduce attackers’ leverage by increasing your operational resilience and decreasing the risk of data theft

  • Understand that cyber extortion is a systemic challenge that requires a coordinated, global response

Extortion is the end of a journey; the last phase of a cyberattack. The adversaries’ path to cyber extortion may take any number of routes. Recall that cyber extortionists attempt to obtain something of value by threatening the confidentiality, integrity, and/or availability of information technology resources. They can accomplish this in a myriad of ways: by stealing confidential data and publishing it, detonating ransomware, launching denial-of-service attacks, or many other malevolently creative means.

As a result, to effectively defend against cyber extortion, organizations must essentially defend against all types of cybersecurity incidents. This starts with building and maintaining strong cybersecurity program.

As we learned in Chapter 3, the adversary’s journey can be broken down into entry, expansion, appraisal, priming, leverage, and finally extortion. Defenders have opportunities to thwart the attack at every phase by implementing effective security technologies, detection mechanisms, and response processes.

While a full treatment of cybersecurity defense can easily expand to fill a book (or a whole series), in this chapter we highlight the keys to building a strong, holistic cybersecurity program. Then, we delve into specific security technologies that help to reduce the risk of compromise. Organizations can further minimize the damage of cybersecurity incidents through early detection and monitoring, reducing the risk of data theft, and increasing their operational resilience.

Cyber extortion is a global challenge, and not one that any individual organization can solve alone. We conclude this chapter by discussing strategies for reducing adversaries’ leverage through far-reaching policy changes.

10.1 Running an Effective Cybersecurity Program

Cybersecurity was the top spending priority for CIOs in 2021, according to Gartner, with a predicted growth rate of 12.4% for such expenditures by the end of the year.1 Not all spending is equally effective, however. “How a security program is planned, executed, and governed is likely as important as how much money is devoted to cybersecurity,” noted a 2020 Deloitte analysis.2 Even mature organizations that have invested heavily in cybersecurity need to continually refine and tune their program as new risks emerge and the technology landscape evolves.

1. “Gartner Forecasts Worldwide Security and Risk Management Spending to Exceed $150 Billion in 2021,” Gartner, May 17, 2021, www.gartner.com/en/newsroom/press-releases/2021-05-17-gartner-forecasts-worldwide-security-and-risk-managem.

2. Julie Bernard and Mark Nicholson, “Reshaping the Cybersecurity Landscape,” Deloitte Insights, July 24, 2020, www2.deloitte.com/us/en/insights/industry/financial-services/cybersecurity-maturity-financial-institutions-cyber-risk.html.

Here are the four keys to running an effective and efficient cybersecurity program:

  1. Know what you’re trying to protect.

  2. Understand your obligations.

  3. Manage your risk.

  4. Monitor your risk.

By tackling these four areas, organizations can reduce the risk associated with cyber extortion attacks, as well as all cybersecurity risks.

10.1.1 Know What You’re Trying to Protect

Many victims of cyber extortion are shocked by the amount of data that adversaries steal—often because the victims didn’t know they were storing all that data in the first place. An inventory is the foundation of every strong cybersecurity program. It’s also critical for responding quickly to cyber extortion events, particularly when concerns arise about potential data exfiltration and/or publication.

Emergency inventories are extremely expensive and are never as effective as a proactive, ongoing inventory process. All organizations should conduct routine, proactive inventories of sensitive data to understand the scope of their cybersecurity program, identify risks, and prepare for response.

10.1.1.1 Why Take an Inventory?

When you think about it, the importance of an inventory is obvious: You need to know what you’re trying to protect, and where it is located, to effectively secure it.

All too often, organizations invest huge amounts of time, effort, and money into their cybersecurity programs without taking an accurate inventory. The result is that sensitive data is left sitting in places that are unprotected; vulnerable systems are overlooked; misconfigured cloud shares go unexamined; there are gaps in compliance; and insurance coverage is not aligned with the risks. Cybersecurity risks that are unseen cannot be properly addressed.

To build an effective cybersecurity program, you must first understand which information resources you are trying to protect. This includes identifying and tracking sensitive data throughout the organization, as well as IT assets such as servers, workstations, network equipment, cloud applications, and more.

It’s not enough to take an inventory once and then forget about it; every organization is constantly evolving. Classifying data into three to five general categories can help; see the authors’ website for a sample data classification policy (ransombook.com).

10.1.1.2 Why an Inventory Is Critical for Cyber Extortion Response

An inventory of information resources is critical for effective cyber extortion response specifically. Consider the all-too-common case of exposure extortion, in which an adversary threatens to publish a cache of stolen data. The last thing the victim needs is to scramble about trying to figure out exactly which data could have been in the stolen repository.

For example, in ransomware cases, there is nearly always a risk of unauthorized access to sensitive data. After all, to encrypt data, the adversary first must access it. To meet legal, contractual, and ethical obligations, the victim typically needs to figure out precisely which data may have been stolen to assess the risk and determine whether cybersecurity or breach notification laws have been triggered.

Responders also need to know precisely which systems and data to restore. That can be a painstaking challenge, particularly during the early and more chaotic portions of the response to a major compromise. Maintaining an up-to-date inventory of data and assets can dramatically reduce response costs and damage in the event of a cyber extortion incident.

10.1.2 Understand Your Obligations

The potential costs and ramifications of cyber extortion incidents depend, in part, on the victims’ legal, regulatory, and contractual obligations. Cyber extortionists often remind victims that they may suffer lawsuits, regulatory investigation, and shame if third parties are notified or impacted.

What’s more, these obligations may directly or indirectly require victims to conduct an investigation, perform a risk analysis, make notifications to data subjects, or take other actions.

Common obligations include the following:

  • Federal, state, and local cybersecurity incident and data breach notification laws

  • Cybersecurity and privacy laws and regulations (such as the General Data Protection Regulation [GDPR] in the European Union, or the Health Information Portability and Accountability Act [HIPAA] and the Cyber Incident Reporting for Critical Infrastructure Act of 2022 [CIRCIA] in the United States)

  • Industry-specific regulations (such as HIPAA/HITECH in the United States)

  • Contractual obligations (such as merchant agreements that require adherence to the Payment Card Industry Data Security Standard [PCI/DSS])

Well before an attack occurs, a qualified cyber attorney should evaluate the organization’s regulatory and contractual obligations with respect to cybersecurity. This assessment should consider the organization’s industry, geographic areas of service, type and volume of information stored, key existing contracts, insurance coverage, and any other factors that counsel believes are relevant. The results should be used to inform incident response processes, as well as proactive cybersecurity investments.

Cybersecurity-related laws are emerging rapidly, the regulatory landscape is constantly evolving, and new contracts increasingly include cybersecurity-related clauses. All organizations should have a process for continuously tracking laws, regulations, and contractual obligations, and updating policies and procedures as needed.

10.1.3 Manage Your Risk

Whole books have been written on managing cybersecurity risks—and even then, it’s impossible to capture every nuance of an effective cybersecurity program. Every organization is unique, and therefore every cybersecurity program is different.

Here are high-level steps that every organization needs to take to effectively manage cybersecurity risks:

  • Assign roles and responsibilities.

  • Build your cybersecurity program.

  • Choose and use a cybersecurity controls framework.

  • Budget for cybersecurity.

  • Develop your risk management plan.

  • Engage in training and awareness.

  • Fund your cybersecurity program.

  • Get cyber insurance.

10.1.3.1 Assign Roles and Responsibilities

Ultimately, it is people who will design, build, and implement your cybersecurity program. Make sure you have trained and qualified people on your team. This starts with strong leadership!

Ideally, the person designing and overseeing an organization’s cybersecurity program should have extensive cybersecurity experience, including familiarity with control frameworks, as well as a strong IT background. All too often, an IT generalist becomes the de facto cybersecurity program leader. This is like asking a family physician to act as a neurosurgeon. You don’t necessarily need to hire a full-time employee to fill this role; it is becoming increasingly common to outsource a fractional chief information security officer (CISO).

Because cybersecurity is a relatively new field, experienced professionals are notoriously difficult to hire, with industry professionals reporting a “zero percent unemployment rate”3 in cybersecurity and a dire lack of qualified candidates. Consider outsourcing when necessary to fill gaps and keep workloads at a reasonable level.

3. Steve Morgan, “Cybersecurity Talent Crunch to Create 3.5 Million Unfilled Jobs Globally by 2021,” Cybercrime Magazine, October 24, 2019, https://cybersecurityventures.com/cybersecurity-jobs-report-2019/.

10.1.3.2 Choose and Use a Cybersecurity Controls Framework

A cybersecurity controls framework is essentially a checklist for your cybersecurity program. It serves as the foundation for the organization’s cybersecurity efforts, ensuring that the organization takes a methodical approach that is in line with industry standard best practices. Rather than reinvent the wheel, most organizations choose a widely used framework such as the NIST Cybersecurity Framework or ISO 27001, customizing it as needed to fit their organization’s unique needs.

Images

Definition: “Security Control”

According to the U.S. National Institute for Security and Technology (NIST), a “security control” is defined as follows:4

4. “Security Control,” U.S. National Institute for Security and Technology, Computer Security Resource Center, https://csrc.nist.gov/glossary/term/security_control.

A safeguard or countermeasure prescribed for an information system, or an organization designed to protect the confidentiality, integrity, and availability of its information and to meet a set of defined security requirements.

Once the framework is selected and customized, you can use it as the basis for defining the cybersecurity program, planning investments, identifying gaps, and informing risk assessments (see Section 10.1.4).

10.1.3.3 Build Your Cybersecurity Program

Every organization should have a formal, written cybersecurity program, which is designed to comply with relevant laws, regulations, and other obligations. The program’s documentation should include clear assignment of responsibilities, the scope of data and assets to be protected (see Section 10.1.1), a summary of obligations (see Section 10.1.2), and details on how the program will be maintained and monitored (see Sections 10.1.3 and 10.1.4, respectively). This document (or suite of documents) should be reviewed and updated at least annually, or more frequently as needed.

All too often, cybersecurity program documentation sits on a dusty shelf (virtually speaking), untouched until an auditor or third party requests access. Make sure to include your cybersecurity program elements in training and awareness programs so that the written materials are translated into action (see Section 10.1.3).

Metrics and reports are also key. As discussed in Section 10.1.4, it’s important to conduct routine assessments to understand the effectiveness of the cybersecurity program. These results should be summarized into easily digested dashboards and provided to leadership routinely, along with any recommendations for program updates.

10.1.3.4 Develop Your Risk Management Plan

There is no such thing as “perfect” security—it is all about risk management. To develop a truly effective and efficient cybersecurity program, each organization should implement and maintain a plan for prioritizing and addressing risks so that the residual risk is aligned with the leadership team’s appetite. This plan should be updated as often as practicable to take into account evolving risks and the state of the organization’s cybersecurity controls.

Historically, many organizations conducted an annual risk assessment (particularly in highly regulated industries such as healthcare or finance). As cybersecurity tools mature, more organizations are embracing continuous risk management, using centralized risk-tracking tools to identify and document risks on an ongoing basis. This, in turn, facilitates the development and maintenance of ongoing risk management plans that are routinely kept up-to-date as new threats and vulnerabilities are identified.

Sections 10.2 and 10.3 provide details on specific high-impact security technologies that should be considered for inclusion in every organization’s risk management plan.

Images

Tip: Proactively Manage Supplier Risks

Supply-chain risks are a growing area of concern, as we have seen throughout this book. The Kaseya ransomware attacks described in Chapter 1 perfectly illustrate how criminals can leverage technology suppliers to launch cyber extortion attacks against thousands of organizations in one fell swoop. In this case, the adversary exploited a vulnerability in the Kaseya remote management product, which was often deployed by third-party managed services providers (MSPs) on behalf of their customers.

For cybercriminals, attacks against the technology supply chain have proved to be an effective strategy, enabling them to maximize their reach and profit. It’s critical for every organization to proactively monitor and manage supplier cybersecurity risks. To implement effective supplier cybersecurity risk management:

  • Start by clearly assigning responsibility for vetting and follow-up.

  • Establish clear requirements for supplier cybersecurity and include these in vendor selection processes.

  • Enumerate all suppliers.

  • Assign a risk rating to suppliers based on factors such as volume of confidential data that the supplier can access and criticality of the supplier for day-to-day operations.

  • Ensure that supplier contracts clearly articulate cybersecurity requirements such as proactive cybersecurity measures, routine assessment and reporting, and incident notification.

  • Vet suppliers routinely, prioritizing them based on their potential risk to the organization’s cybersecurity posture.

  • Monitor and follow up consistently on any areas of concern.

  • Include key suppliers in the organization’s cybersecurity incident response processes.

Supplier risk management has become an integral part of every effective cybersecurity program.

10.1.3.5 Engage in Training and Awareness

Effective cybersecurity programs include training and awareness programs that routinely communicate relevant program information to appropriate persons, including IT staff, security team members, legal counsel, general employees, and others. It is not enough to communicate information once: Effective training programs offer consistent, regular knowledge reinforcement.

On-demand cybersecurity training platforms have grown in maturity and popularity in recent years, particularly for general employee education. These systems can provide short training videos and games that adult learners can digest routinely, at convenient times. When paired with phishing test programs, these platforms can be very effective at reducing human-based cybersecurity risks across the enterprise.

Make sure to invest in specialized training for IT personnel, security professionals, and incident responders. Especially in a tight job market when workers are scarce, organizations need to invest in routine training for technical staff.

The executive team and board of directors also need routine education and awareness regarding security threats. A combination of short, on-demand awareness videos, supplemented by live training and interactive expert sessions, can help leadership teams understand the current threats and make smart decisions on behalf of their organization.

10.1.3.6 Fund Your Cybersecurity Program

No cybersecurity program can address every risk. On a regular basis, leadership should review the results of risk assessments (see Section 10.1.4) and use this information to prioritize their investments in cybersecurity.

This might include allocating funds for human resources, equipment, services, and more. By aligning investments to address the highest-risk areas, organizations can make the most effective use of their resources. Since cybersecurity evolves quickly, it’s important to review and update your budget routinely, and ensure your investments remain in line with leadership’s risk appetite.

10.1.3.7 Get Cyber Insurance

Cyber insurance has evolved to play a critical role in cyber extortion risk mitigation and response. First, like other types of insurance, cyber insurance is a vehicle for transferring residual risk to a third party. Certain types of coverage are especially useful for transferring risks relating to cyber extortion:

  • Business interruption, which covers lost revenue due to technology outage.

  • Data recovery, which can cover costs associated with restoring data from backups, decrypting data, manually recreating lost data, and more.

  • Cyber incident and breach response, which typically covers costs for investigating and responding to a potential breach. This can include legal guidance, incident response consulting, threat hunting, forensic investigation, notification costs, and more.

  • Information security and privacy liability, which can cover litigation expenses in the event of lawsuits, regulatory fines, and more.

Cyber insurers are also key players in the extortion response process. Insurers have a vested interest in supporting effective response practices and minimizing damage, since they foot a portion of the bill in the event of a claim. Unlike with car accidents, in cyber extortion cases the insurer has time to influence the outcome of the incident by providing support and guidance in the response process.

Many organizations do not have the resources to maintain their own trained and experienced cyber incident response staff in-house. To fill this gap, cyber insurers have put together cyber incident response teams and provide valuable services during the response process. These services often include, but are not limited to:

  • Hotline for reporting cyberattacks

  • Panel of vendors (often vetted) that provide:

    • – Incident response services

    • – Ransom negotiation

    • – Legal guidance (especially important for breach investigations)

    • – Public relations

    • – Crisis management support

  • Funding for response/recovery services and ransom payment

  • Business interruption coverage

As a result of this kind of support, victims of cyber extortion often fare much better when cyber insurers are involved. Indeed, victims with cyber insurance coverage are more likely to have access to experienced professionals who can provide them with proper guidance and support, as well as the funds needed to engage these providers during a crisis.

Once cyber insurance coverage is selected, it’s important to integrate it into the organization’s incident response programs. Make sure to document the appropriate contact information and processes for notifying your cyber insurance carrier and assign responsibility for notifying the carrier (including after hours and on weekends, if needed). Include your cyber insurer in tabletop exercises and incident response training.

Images

Heads Up! Cyber Insurers Incentivize Effective Security Controls

Because cyber insurers have a vested interest in reducing risk, they often provide valuable risk-reduction resources for insureds, and play a pivotal role in incentivizing the adoption of effective cybersecurity measures.

“Insurance historically helps set standards and we are doing the same now for cyber,” said Bob Wice, Head of Underwriting Management, Cyber and Tech at Beazley,5 in an interview with the authors. “We are in a prime spot to be able to evaluate where organizations are having problems and are seeing losses … and then we transparently inform the prospective insureds and current buyers.”

5. Interview with the author via Zoom, August 11, 2021.

Cyber insurers often offer value-added services, such as training, policy templates, or proactive scanning, which can be useful for IT staff and leadership. The terms of your cyber insurance policy may also inform aspects of your proactive cybersecurity program. Ensure that any requirements needed to maximize the value of your policy are communicated to IT leadership, such as documentation or technologies that should be implemented.

10.1.4 Monitor Your Risk

Cyber extortion risks are constantly evolving. It’s important for every organization to maintain an accurate understanding of current risks, so that it can effectively protect its information resources.

“Monitoring risk” refers to the process of evaluating threats and vulnerabilities, assessing the potential impact and likelihood of a negative event, and determining the effect of security controls in place.

An effective risk monitoring program typically includes at least three components: cybersecurity controls assessment, technical security testing, and risk assessment. The organization should also track, evaluate, and report on any cybersecurity incident to identify gaps and the costs associated with security issues.

By accurately understanding the organization’s risk profile, leadership can effectively invest funds where they are needed most and make efficient use of limited resources.

10.1.4.1 Cybersecurity Controls Assessment

A controls assessment is an evaluation of the organization’s actual cybersecurity program compared with a list of controls. Typically, the controls assessment is based on a widely accepted framework, such as the NIST Cybersecurity Framework or ISO 27001, although it may be customized to meet an individual organization’s needs. The selected framework should be chosen to align with applicable laws, regulations, standards, and contractual obligations.

10.1.4.2 Technical Security Testing

Technical testing is conducted to identify known vulnerabilities, configuration weaknesses, policy issues, or any other gaps in the actual technical security profile of an organization’s systems. Appropriate testing varies based on each organization’s unique technology environment, but typically includes vulnerability scans, configuration reviews, penetration testing, phishing tests, and other technical security assessments.

10.1.4.3 Risk Assessment

A cybersecurity risk assessment is a methodical evaluation of potential threats and vulnerabilities, which the assessor maps to controls in place to determine the residual risk to the organization. Ideally, the results of the controls assessment and technical testing will be used as input in the risk assessment.

Because the cybersecurity threat landscape changes rapidly, it is wise to conduct all three types of assessments regularly. Modern risk management software can support continuous data discovery and data mapping, as well as regular controls assessments and risk assessments that take into account risks identified during routine technical testing.

10.1.4.4 Track and Analyze Cybersecurity Incidents

In addition to ongoing assessments, it’s important to track ongoing cybersecurity incidents, routinely analyze root causes, and provide reports and metrics to upper management. This way, the organization can learn from incidents and identify effective measures for reducing the risk of future issues. In addition, incident reports can help leadership better understand the risks and evaluate the potential return on investment for cybersecurity controls.

10.2 Preventing Entry

Cyber extortion attacks are highly preventable, starting at the point of unauthorized entry into the victim’s environment. As noted in Chapter 3, common entry vectors include the following:

  • Phishing: The adversary sends an email, text, or other message designed to trick the victim into taking an action that gives the adversary information and/or access to the victim’s environment.

  • Remote login: The adversary successfully initiates an interactive session via a remote login interface such as RDP, using credentials that have been guessed, stolen, purchased, or otherwise obtained.

  • Software vulnerability: A vulnerability in the victim’s Internet-facing applications, servers, or network equipment is exploited by the adversary and allows them to gain access.

  • Technology supplier attack: The adversary has access to a supplier’s technology resources (such as a software provider or MSP), whether legitimately or through compromise, and leverages it to gain access to the victim’s environment.

By implementing specific security technologies, organizations can dramatically reduce the risk of an intrusion that might metastasize into a cyber extortion incident. At the time of this writing, some of the most effective security technologies for preventing entry include the following:

  • Phishing defenses, including spam filtering, web proxies, and training

  • Strong authentication, such as multifactor authentication tools and password managers

  • Secure remote access solutions

  • Patch management

In this section, we consider how each of these technologies can be leveraged to prevent cyber extortion attacks and the intrusions that lead up to them. In many cases, these same technologies can also help to limit the damage even if attackers do gain entry.

10.2.1 Phishing Defenses

Phishing attacks have consistently been among the top vectors of entry for adversaries for the better part of two decades. Although most people associate “phishing” with emails, adversaries can leverage any medium for communication, including SMS (“smishing”), voice (“vishing”), social media, fax, and more. Ultimately, the adversary’s goal is to trick the recipient into taking an action that will give the adversary information or access, typically by clicking on a link, opening a malicious attachment, or responding to a request for information.

Phishing is often paired with a malicious website designed to steal the victim’s credentials or install malware. As the Verizon Data Breach Investigation Report (DBIR) explained, “Phishing continues to walk hand-in-hand with [use] of stolen credentials in breaches as it has in the past.”6

6. Verizon, Data Breach Investigations Report, May 2021, p. 16, www.verizon.com/business/resources/reports/dbir/2021/masters-guide/summary-of-findings/.

Many tools and techniques are available to thwart phishing attacks. Among the most commonly used options are the following:

  • Spam filtering

  • Web proxies

  • Training platforms

We will discuss each of these in turn.

10.2.1.1 Spam Filtering

A strong spam filtering system can block malicious links and attachments and prevent them from ever reaching the intended recipient. Systems may be stand-alone applications that serve a specific purpose, such as the Barracuda Spam Firewall, or they may be integrated with email systems, such as Exchange Online Protection (EOP) for Microsoft 365. No system is 100% effective; however, a good spam filtering system will greatly reduce the number of malicious (and junk) emails that your staff receives.

10.2.1.2 Web Proxies

In the simplest terms, a web proxy is an intermediary that sits between a client and a web server. Web proxies can be used for many purposes, including caching, filtering, and tracking of web traffic.

Web proxies can be configured to filter a user’s web traffic and block access to known malicious sites. This capability is especially useful in the event that a user clicks on a link in a phishing email, because it can stop a malicious site from loading.

Many malware infections include a command-and-control (C2) component in which the infected computer reaches out to a server controlled by the adversary to receive further instructions or updates. Web proxies can be configured to monitor for this type of traffic and block it if it occurs. They can also alert on higher-than-normal outbound data transfers, which may indicate that data is being exfiltrated.

Web proxy logs are a rich source of evidence if an attack does take place. Like spam filters, no web proxy is 100% accurate, but every layer of security helps.

10.2.1.3 Training

“The most vulnerable hardware on a network is the human mind,” wrote noted Twitter cybersecurity contributor, @swiftonsecurity.7 Users need to be taught how to recognize phishing emails as malicious, how to report them, and most importantly, not to click on any links or attachments the messages may contain.

7. SwiftOnSecurity (tweet), August 9, 2015, https://twitter.com/SwiftOnSecurity/status/630530012102262784?s=20.

User training is a key component of phishing defense. Training is most effective when it is provided regularly and can take many forms. On-demand cybersecurity training subscription platforms such as KnowBe48 and Ninjio9 provide a library of short videos, quizzes, interactive games, and more. Some of these services offer a broader awareness program that includes email templates, posters, and other supports.

8. KnowBe4, www.knowbe4.com/.

9. Ninjio, https://ninjio.com/.

The most effective training and awareness programs also include phishing tests, in which fake phishing emails are sent to an organization’s users to evaluate the organization’s risk and raise awareness. These phishing test platforms can be stand-alone systems (such as the open-source Gophish10) or integrated with cybersecurity training platforms.

10. “Open-Source Phishing Framework,” Gophish, https://getgophish.com/.

To successfully manage the risk of phishing, organizations need to create a culture of cybersecurity awareness. A key element is encouraging users to report both suspicious emails and their own mistakes if they do fall for an adversary’s ruse, without fear of reprisal. Mistakes happen, after all. In the hustle and bustle of the average workday, users may react without thinking and click the wrong thing—a link in an email, an attachment on the email, a suspicious website. Rewarding users who self-report (or at least encouraging them to) not only promotes a healthy cybersecurity culture, but also enables the security team to respond to potential threats more quickly and may prevent an incident altogether.

10.2.2 Strong Authentication

Cyber extortion attacks often begin with credential theft. Adversaries may steal user credentials through phishing attacks, or simply purchase stolen credentials on the dark web from an initial access broker (as discussed in Chapter 3). They may then use these stolen credentials to access remote login interfaces and gain a foothold to install malware within the victim’s network or break into cloud storage and download repositories of sensitive data.

Multifactor authentication and password managers are two key technologies that can help foil credential theft.

10.2.2.1 Multifactor Authentication

Authentication is the process of verifying a person’s identity. Three different types of authentication are commonly used in cybersecurity today:

  • Something you know (for example, a password)

  • Something you have (for example, a smartphone or hardware token)

  • Something you are (for example, a fingerprint)

Multifactor authentication is the process of verifying a person’s identity using two or more of these methods combined. For example, a password combined with approval using a smartphone app would combine “something you know” with “something you have.” This way, even if an adversary has stolen a user’s password, they couldn’t immediately access the user’s accounts without access to the user’s smartphone app as well.

Because password theft is so rampant, single-factor authentication using passwords is risky, particularly for Internet-facing accounts. Happily, today strong multifactor authentication can be implemented using a free or low-cost smartphone app (available from Microsoft, Google, Duo, and many more) or hardware tokens (such as Yubikey, RSA, and many others). In particular, the emergence of authenticator apps for smartphones has facilitated adoption of multifactor authentication on a wide scale, for both corporate and consumer use.11

11. Sherri Davidoff, “Not All Two-Factor Authentication Is Created Equal,” LMG Security, December 12, 2019, www.LMGsecurity.com/not-all-two-factor-authentication-is-created-equal/.

10.2.2.2 Password Managers

“Humans … have only a limited ability to memorize complex, arbitrary secrets, so they often choose passwords that can be easily guessed,”12 explained NIST in an analysis of the strength of “memorized secrets” when used for authentication. This simple fact underlies the weakness of passwords as an authentication mechanism and has led to countless cyber extortion incidents.

12. U.S. National Institute for Security and Technology, Special Publication 800-63B: Digital Identity Guidelines, June 2017, Appendix A.1, https://pages.nist.gov/800-63-3/sp800-63b.html.

What’s more, humans have difficulty memorizing many different passwords, and often reuse the same or similar passwords across multiple systems. The result is that an adversary who steals a victim’s Twitter password may be able to reuse that information to break into their bank account and work email. This phenomenon has led to a rise in “credential stuffing” attacks.

Password managers can effectively reduce the risk of password reuse and weak passwords, when used properly. Essentially, a password manager is specialized software designed to help users generate strong passwords and store them in an encrypted, attack-resistant vault. Cloud-based password managers such as LastPass, Dashlane, and 1Password can enable users to access stored passwords from multiple devices. The vault itself is protected with one master password, and ideally multifactor authentication, particularly if it is stored in the cloud.

Unfortunately, password managers are one of the most underutilized security tools. While many organizations train users to choose long and unique passwords, they don’t always acknowledge that the human brain is simply not designed to remember long, complex passwords. Absent a password manager, users tend to reuse passwords or store passwords in documents on their computers, which can facilitate attacks. Deploying an effective password manager—and training users to leverage it—can reduce the risk of cybersecurity incidents, and therefore cyber extortion attacks.

10.2.3 Secure Remote Access Solutions

Unfortunately, many cyber extortion attacks begin with the adversary accessing the victim network through remote access services. Remote access is a necessity for staff, IT administrators, and vendors at organizations around the world.

Attackers constantly scan the Internet for available remote access interfaces such as RDP (as discussed in Chapter 3). Armed with a list of accessible remote access services, they can target these services with authentication attacks such as credential stuffing or vulnerability exploits. Adversaries can also leverage trust relationships between technology vendors and customers to leapfrog between environments.

Many organizations allow employees to use LogMeIn, GoToMyPC, or similar tools to connect directly to their workstations from their home computers. However, this practice introduces significant risk: If the user’s personal computer becomes compromised, the adversary can then use these same tools to access the organization’s internal network and hold it hostage.

Here are three popular ways to facilitate remote access while reducing risk:

  • Disable less secure remote access services such as RDP, particularly for Internet-facing systems. Simply disabling these services can prevent compromise and dramatically reduce the risk of cyber extortion incidents.

  • Deploy virtual private network (VPN) software. Modern VPN clients offer critical security features, such as a hardened operating system designed to resist attacks. Many VPNs can also be configured to scan remote systems for security issues before allowing connectivity.

  • Use virtual desktop infrastructure (VDI). VDI consists of virtual workstations that are accessible via the Internet. VDI environments can be designed to limit user access and offer only specific applications. In this manner, they can reduce the risk associated with a compromised remote endpoint and facilitate quick containment of cybersecurity incidents.

By disabling less secure remote access models such as RDP in favor of tools such as VPNs and VDI suites, organizations can prevent cybersecurity incidents and thereby reduce their risk of cyber extortion.

10.2.4 Patch Management

Adversaries constantly scan and search for vulnerable software across the Internet. As discussed in Chapter 3, software vulnerabilities are often used to quickly gain a foothold inside the victim’s environment. Once access is gained, the adversary may sell access to other cybercriminals or take advantage themselves. Since cyber extortion is so profitable, it is often the end result of a cyberattack, whether or not it is the initial intent of the adversary who gains access.

Cyber extortion gangs also directly leverage software vulnerabilities to escalate privileges once inside an environment. For example, the Conti gang’s playbook, leaked by a disgruntled affiliate in 202113 and reviewed by the authors of this book, included step-by-step instructions for taking advantage of the common “PrintNightmare,” “ZeroLogon,” and “EternalBlue” flaws. At the time of the leak, the Microsoft patch to fix “PrintNightmare” had been available for less than a month—yet it had already been incorporated into the step-by-step instructions distributed to Conti affiliates.

13. Lawrence Abrams, “Angry Conti Ransomware Affiliate Leaks Gang’s Attack Playbook,” Bleeping Computer, August 5, 2021, www.bleepingcomputer.com/news/security/angry-conti-ransomware-affiliate-leaks-gangs-attack-playbook/.

To counter these sophisticated adversary training and distribution processes, defenders need to patch effectively and routinely.

Case Study: Unpatched Exchange Server

In 2021, a cyber extortion group named AvosLocker attacked a local government entity. The adversary had gained access to the victim’s network, detonated ransom-ware on all the hosts and servers within the environment, and demanded a ransom of $3 million to restore the files and prevent data exposure.

The authors of this book were called in to assist. As the investigation moved forward, all signs of malicious activity within the network seemed to point to one server: the Microsoft Exchange 2016 server that the victim used for email. At the time of the investigation, Exchange servers across the world were routinely falling victim to the infamous “ProxyShell” and “ProxyLogon” vulnerabilities, which Microsoft announced and patched in the first few months of 2021. Cybercriminals were actively taking advantage of this widespread vulnerability and using it to gain access to networks.

Further investigation confirmed the authors’ suspicions that the Exchange server had been the initial point of entry into the network. The evidence showed the adversary had deployed malicious web shells on the server and then leveraged that access to install the AnyDesk remote management software suite, which in turn gave them persistent remote access.

The victim wanted to know how the hackers got in, because it did apply patches routinely. Ultimately, after scanning the server and interviewing IT staff, investigators determined that when the patch was installed, it generated multiple errors and was never fully applied. Unfortunately, while the victim had manually attempted to install the patches, it did not have a process for verifying that the installation was successful. The result was a costly—and avoidable—disaster.

Let’s discuss what makes a patch management program successful.

  • Know what to patch. All too often, software remains unpatched because the organization’s IT staff is simply not aware that it is deployed in the environment. For this reason, it’s important to maintain an accurate inventory of software and dependencies. Depending on the size and complexity of an organization, tracking may be accomplished using a simple spreadsheet or a sophisticated asset management system. Make sure to include application software, operating systems, and firmware in your program. Devices such as firewalls, routers, and VPNs must be updated regularly as well.

  • Patch quickly. Many organizations have monthly or bimonthly patching cycles. However, when a critical vulnerability is announced, hackers may actively try to exploit your server within hours or days—not weeks. By the time a patch is applied, the system has already been hacked. Make sure to document standard patch time frames and audit routinely to confirm that they are consistently applied. Carefully consider the risks of waiting versus the time needed to fully test and deploy a patch.

  • Use supported software. These days, it is common to have software running on a network even after the vendor has stopped releasing patches. Such software is highly vulnerable to exploitation. Of course, it is best to discontinue the use of outdated software, but in some cases the organization must keep running it, at least for some period of time, to support critical business processes. In these cases, defenders can reduce their risks by placing outdated software on an isolated or highly segmented part of the network with very limited traffic. Carefully track this software and regularly review its usage.

  • Make time to patch. Many organizations don’t apply patches regularly because it is difficult (or even impossible) to find a good time to apply patches and restart critical systems. Architect your infrastructure with redundancy, so that you can reboot a critical system to install a patch without impacting the ongoing operations. Remember that planned downtime is better than emergency downtime in the event of a cybersecurity incident.

  • Plan for the unexpected. Even the most well-tested patch deployments can cause problems. Fear of “breaking something” can cause system administrators to delay patching. To alleviate this issue, develop and implement a software patch test plan whenever possible, to increase the likelihood of a successful deployment. Have a strategy for rolling back patches quickly in the event that a patch impacts system functionality.

  • Monitor patch status. As seen in the “Unpatched Exchange Server” case study, often victims are taken by surprise because they thought a patch was fully installed and it was not, due to error or oversight. Patch verification is a critical component of every successful software patch process. Make sure to routinely check systems’ patch status using automated patch verification software. Alert IT staff of issues and correct failed patch deployments quickly.

Images

Heads Up! Software Bill of Materials

Tracking software products is a challenging but achievable task for IT teams. Tracking dependencies, however, is far more complex—yet equally important. In many instances, adversaries leverage vulnerabilities in shared libraries or software that was quietly incorporated into vendor products, and then used by end customers without their direct knowledge. When a major vulnerability hits (such as Log4j), defenders are left scrambling to figure out which of their myriad of products are vulnerable. By the time they find out, it may be too late.

In May 2021, the U.S. federal government issued an executive order requiring software providers that do business with the federal government to provide, among other information, a “software bill of materials” (SBOM).14 This is conceptually equivalent to a list of ingredients in food products. While specific information may vary, an SBOM typically includes details about software dependencies, required packages, vendor agents, software development kits (SDKs), application programming interfaces (APIs), and more.

14. “Executive Order on Improving the Nation’s Cybersecurity,” The White House, May 12, 2021, www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/.

By collecting and tracking SBOMs, defenders can quickly determine whether they are affected by a new vulnerability, which in turn facilitates a quick response. Over the coming years, the distribution and use of SBOMs will likely become more common. Since tracking SBOMs and responding to vulnerability announcements involves managing thousands of software products, defenders will need tools that incorporate SBOMs into their software management and incident response. These tools barely exist at the time of this writing but will likely become widespread in the coming years.

10.3 Detecting and Blocking Threats

Even when an adversary successfully enters the victim’s technology environment, speedy detection can enable victims to quash a cyberattack before significant damage is done and prevent the extortion attempt. As detailed in Chapter 3, there are many points at which the victim can identify, mitigate, and block the precursors to a cyber extortion attack.

Effective threat detection programs typically include the following components (among others):

  • Endpoint detection and response

  • Network detection and response

  • Threat hunting

Detection tools must be carefully tuned prior to their deployment to ensure that the systems accurately detect indicators of a potential cybersecurity incident. Even so, there will always be “false negative” events, in which detection systems fail to alert on malicious activity, as well as “false positive” events, which are triggered by benign activity and cause unnecessary work for responders.

Cybersecurity leaders should establish goals and metrics for detection systems and ensure that false-positive and false-negative events are aligned with leadership’s risk appetite. To provide consistent value, detection tools and alerting systems also need to be subject to continuous monitoring.

10.3.1 Endpoint Detection and Response

Endpoint detection and response (EDR) software represents the latest evolution in endpoint protection. It typically includes features from traditional antivirus tools, host-based intrusion detection/prevention systems, vulnerability scanners, and more. A hallmark of modern EDR software is that all alerts are reported back to a central console, and the EDR software includes built-in features to facilitate the response.

A growing cyber extortion trend is for adversaries to leverage normal IT tools to exfiltrate data and prime the victim’s environment, thereby enabling the adversary to evade traditional signature-based detection mechanisms. Modern EDR software can facilitate detection even when the adversary uses legitimate IT tools, by leveraging behavior-based detection methods in combination with more straightforward signature-based solutions.

Responders can leverage features of EDR software to quickly take action, such as proactively blocking and isolating remote workstations. This ability makes EDR software uniquely valuable in the event of a ransomware attack. As detailed in Chapter 5, EDR software is a critical tool that can be used to isolate infected systems, halt ransomware encryption/data destruction, stop data exfiltration, and lock out the adversary.

When selecting EDR software, consider the ease of deployment, compatibility with existing software, and availability of support, in addition to cost and features. A centralized EDR system can also be monitored by an external vendor to increase the effectiveness and speed of the response.

Case Study: Saved by the EDR

In 2019, a professional services firm in the northwest United States suffered a ransomware attack at the hands of the GlobeImposter ransomware group. IT staff received a call from the FBI on a Wednesday evening. The FBI’s cybercrime division had identified potentially malicious network traffic originating from the victim’s network. The IT team was advised to respond immediately, because this was a strong indicator of an impending attack against the organization’s network.

Unfortunately, the IT team decided to respond in the morning. By the time staff arrived at their offices, all of their workstations and servers were encrypted with the GlobeImposter ransomware. The adversary had even encrypted the backups, which were now useless.

The authors’ firm was engaged and immediately flew to the victim’s offices and deployed an EDR toolkit to all hosts on the network. It didn’t take long to identify the Dridex banking Trojan on the network, which at the time was one of the most dangerous pieces of malware on the planet. One of the hallmarks of this malware was the ability to provide persistent network access to the adversary controlling it.

Upon analysis, the authors identified indicators of compromise going back at least 60 days prior to the ransomware detonation. The authors quickly eradicated the threat from the network and closed off the adversary’s access point.

Surprisingly, on the very same day, the EDR dashboard indicated that a new infection was attempting to take hold on the network. This time, it originated from the computer used by the CIO. Upon further investigation, it turned out that an employee had recently received a phishing email with an infected document attached. The employee forwarded the email to the CIO and asked if it was legitimate. The CIO had opened the document on his workstation and enabled macros, nearly infecting his own computer with the malware.

Fortunately, because effective EDR software had been deployed, the malware was contained this time.

10.3.2 Network Detection and Response

Network detection and response (NDR) tools provide capabilities that complement EDR software. A modern adversary that has compromised an endpoint can obscure much of their activity by leveraging commonly used IT software, encrypting payloads, and blending their actions into the system’s normal behavior. As a result, EDR or antivirus software may fail to alert on malicious activity—but traffic moving between hosts can contain clues a responder needs to detect unauthorized access, stop lateral spread, determine the incident scope, and prevent further compromise.

Enter NDR solutions, which monitor network activity and facilitate real-time response. Products such as ExtraHop’s Reveal(x) and Cisco’s Stealthwatch often utilize machine learning to establish normal activity profiles, then identify potentially malicious activity that deviates from that baseline. The features included in traditional IDS/IPS have been incorporated into modern NDR solutions, which now include more behavioral detection capabilities and tools to facilitate real-time response.

Like EDR software, many of today’s NDR tools are available as cloud services. This enables responders to access the data even if the internal network is completely down.

10.3.3 Threat Hunting

Threat hunting, as described in previous chapters, refers to the process of proactively and manually searching a technology environment for indications of threats. While threat hunting is an essential part of cyber extortion response, it can also be used proactively to identify and prevent cyber extortion attacks.

Recall that a primary use of threat hunting is to root out malicious activity before a full network takeover occurs. Often, EDR software is used both to conduct routine threat hunting and to facilitate a quick response. Additionally, threat hunters need to be specially trained to detect these subtle indicators of compromise and interpret their meanings accurately. Many organizations outsource threat hunting because it requires a specialized skill set and qualified cybersecurity professionals are in high demand.

When developing threat hunting processes, consider the following issues:

  • Software and licensing costs

  • Third-party vendor contracts

  • Testing frequency

  • Training time and costs

  • Acceptable software use

Threat hunting should be a routine part of your cybersecurity program. For an in-depth discussion of threat hunting in cyber extortion cases, see Chapter 5.

10.3.4 Continuous Monitoring Processes

More than three-fourths of all cyberattacks happen outside of normal business hours, according to a 2020 study by FireEye.15 The reasoning behind this strategy is obvious: If there is nobody around to notice or respond to an attack, then the adversary has a much higher chance of fully deploying ransomware or stealing data without interruption.

15. Kelli Vanderlee, “They Come in the Night: Ransomware Deployment Trends,” Mandiant, March 18, 2020, www.mandiant.com/resources/they-come-in-the-night-ransomware-deployment-trends.

Of course, IT staff need to sleep at some point or another. Adversaries are aware of this, which is why they frequently target victims during times and days when IT staff may be limited in numbers or not on the clock at all.

Continuous monitoring is critical for ensuring that detection and response can occur consistently, regardless of when attackers strike. A large enterprise with rotating shifts of cybersecurity staff might be able to accomplish this, but small to midsized (and many large) organizations don’t have sufficient staff to implement effective 24/7 monitoring.

Outsourced monitoring services can be invaluable for ensuring 24/7 coverage, particularly at times when adversaries are most likely to strike—outside normal business hours, including weekends and holidays. This coverage can facilitate early detection of malicious activity and prevent serious cybersecurity incidents. In addition, outsourced monitoring providers can identify trends and patterns across a wide range of customer environments, benefiting even large organizations.

Effective continuous monitoring programs are carefully integrated into the organization’s incident response procedures, ensuring that all qualified indicators of attack or compromise elicit an appropriate response within the expected time frame.

Importantly, continuous monitoring programs should be tested routinely to ensure that they are effective and to identify any weaknesses. This is typically accomplished by using attack simulation and response testing, in which a team of trained cybersecurity professionals conduct planned, timed testing designed to trigger various aspects of the detection and response processes. In this manner, gaps can be identified and addressed.

10.4 Operational Resilience

Boosting operational resilience is key to weathering a cyber extortion attack. When a cyber extortionist strikes, victims need to maintain their operations and regain normal functionality quickly. The following resources can dramatically reduce damage and facilitate a quick response in cyber extortion cases:

  • Business continuity plan

  • Disaster recovery processes

  • Backups

In this section, we discuss each of these resources, including common pitfalls and tips for success.

10.4.1 Business Continuity Plan

An effective business continuity plan (BCP) can avert a potential disaster. In a cyber extortion attack, one of the first steps is to assess the functionality of information systems and identify which services have been impacted. The results of this evaluation then inform the response processes and influence the negotiations.

The BCP outlines how your organization will maintain operations when critical elements of the organization’s normal systems are not functioning properly. This can occur because of natural disasters, service outages, cyberattacks, or other scenarios where normal operations are not possible for an extended period. At minimum, a BCP should include these elements:

  • Alternate contact information for members of the response team and organization’s leadership. This can include phone numbers, backup email addresses, physical locations, and more.

  • Out-of-band communication methods for distributing information quickly in the event that normal communications channels are compromised or unavailable. Given the myriad of cloud-based communication options available today, many choices are possible, including chat platforms such as Slack, videoconference platforms, encrypted communication apps such as Signal or Telegram, third-party notification systems, and communications systems that do not involve the organization’s infrastructure.

  • Current and complete inventory of information systems, including physical locations, the purpose of each asset, and the specific software installed. This can help recovery teams quickly assess which services are unavailable and what their priority is during restoration.

  • Alternate workflows for critical processes, including steps such as utilizing cloud infrastructure as a failover, redirecting traffic to a colocation facility, manual data recovery, and more. Consider how to maintain continuity when it comes to key processes such as invoicing, payroll, client management, and communications.

  • Process documentation (including incident response procedures) stored in an alternate location so that if normal systems are impacted, the response team can still access them.

  • Credential repositories for key systems, so that responders can recover and reconfigure them in the event of a disaster. Password vaults, such as LastPass and Dashlane, can be integrated into BCP workflows.

  • Training processes for responders and leadership who may need to implement and execute the BCP. The response team needs to be familiar with the BCP and efficiently execute the playbook to minimize downtime and negative impacts.

Most importantly, the BCP needs to be established long before an incident takes place. An effective BCP is not something that can be created on the fly. A trusted security partner can help you get started, and ongoing testing of the plan using activities such as tabletop exercises will help an organization fine-tune the plan for its environment.

10.4.2 Disaster Recovery

The disaster recovery (DR) plan is your roadmap for restoring functionality after an impactful event such as a ransomware attack. Your choices in the response process can significantly impact the time to reach recovery milestones, which in turn impacts the potential damage. By following an established roadmap, responders can minimize downtime and avoid costly slowdowns.

Key components of a DR plan include the following:

  • Contact information for recovery team members

  • Critical data locations

  • Infrastructure and software inventory

  • Backup and recovery instructions

  • Recovery time objective (RTO) and recovery point objective (RPO) (See Chapter 4 for details.)

  • Resources such as instructions for gaining access, keys, and credentials

Technology infrastructures evolve quickly, as do threats. As a result, DR plans need to be tested, reviewed, and adjusted on an ongoing basis. Even small changes in configuration and software usage can be important when it comes time to recover.

When developing your DR plans, consider your recovery environment. Certain environments can be designed to support instant failover to a separate network infrastructure, or to support immediate deployment of clean virtualized environments that can facilitate fast recovery of operations even while the original environment is unavailable.

Case Study: Back That Truck Up!

In early 2017, the authors were called to assist a large transportation company that had suffered a ransomware infection. All of its systems were down, and the criminals had deleted the company’s backups. The company had hundreds of trucks out on the road. The trucks were all outfitted with GPS transponders and laptops; this was how dispatchers communicated with drivers and tracked their progress. They sent the address, date, and time to the trucks via their online routing system and monitored their status in real time.

With their servers down, the company had no idea where the trucks were. They didn’t even know where the trucks were supposed to be, and when. Their email was down, their bookkeeping system was down, and all their file shares were locked up. Staff could make phone calls, but they had no contact information for drivers or customers. A few drivers would call to ask where they were supposed to go, but the company didn’t have answers.

The organization’s leaders said at the time that if they couldn’t get their systems back up and running, fast, they would go out of business.

The first question we asked was, “Do you have backups?” The staff explained that they had backups (offsite) but that unfortunately the server was in a remote data center attached to the company’s primary domain, which meant it was inaccessible with the rest of the network down. Moreover, IT staff determined that the adversary had found the backup server, completely erased the hard drive, and then encrypted it for good measure to make recovery from backups impossible.

The victim requested that we begin negotiating with the criminals. The demand was approximately $10,000, which seemed large at the time. (How times have changed!) After receiving payment, the criminals sent the decryption utility, along with screenshots that they provided as a guide. We tested the decryptor and then helped the victim bring its servers online. All told, the trucking company was back up and running a few days after its systems were first taken down (albeit with a skeleton infrastructure). It was able to resume business quickly and was fully recovered within 2–3 weeks.

10.4.3 Backups

Backups are a critical component of cyber extortion response processes. The availability of effective backups can reduce an adversary’s leverage and obviate the need for a victim to pay a ransom demand. In this section, we review the key components of a backup solution, the importance of testing backups, the emergence of “immutable” backups, and key issues involving offsite backup restoration.

10.4.3.1 Key Services and Data

An effective backup solution for an environment should include as many critical infrastructure components as possible in case an emergency requires a substantial rebuild. A well-designed and -configured backup system can also act as a significant time-saver in some cases, allowing a responder to rebuild specific components of critical systems without performing a full restoration. This can be very helpful if your operating system backups are infected or compromised.

Of course, all organizations face a tradeoff between functionality and cost. The more data you back up, the more you will pay to store that data, and the longer it will take to restore the data in a crisis.

Key services and data to consider including in backups include the following:

  • Server operating systems

  • Data repositories

  • Proprietary applications

  • Active Directory configurations

  • Group policies

  • Firewall and router configurations

  • VLAN configurations

  • Other critical network components

10.4.3.2 Test Your Backups (or Else You Don’t Have Backups)

Backups need to be maintained, updated, and—most importantly—tested. IT staff should also be trained on how to access and execute recoveries without delay. A scripted and rehearsed recovery procedure should be included as part of the organization’s response planning and tested periodically to ensure that restoration procedures do not become an unnecessary roadblock.

As a perfect example, consider Arizona Beverages and the ransomware attack it suffered in 2019.16 After being severely impacted by an iEncrypt ransomware attack (linked to the infamous BitPayment gang), the company attempted to recover its network using the Cisco backup system connected to its network. Unfortunately, IT staff discovered that backups had not been configured properly and they could not immediately begin restoring data. The recovery process was delayed for days until Arizona Beverages signed an “expensive” service contract with Cisco. “Once the backups didn’t work, they started throwing money at the problem,” reported an unnamed source, according to TechCrunch, which first reported the attack.17 This undoubtedly added a substantial expense to the recovery cost.

16. Zack Whittaker, “Arizona Beverages Knocked Offline by Ransomware Attack,” TechCrunch, April 2, 2019, https://techcrunch.com/2019/04/02/arizona-beverages-ransomware.

17. Whittaker, “Arizona Beverages Knocked Offline by Ransomware Attack.”

10.4.3.3 Immutable Backups

The term immutable backups, meaning backups that cannot be changed or deleted, has gained popularity as the number of ransomware attacks has increased. As ransomware gained momentum, defenders began implementing backup solutions more consistently, in an effort to prevent adversaries from holding the upper hand in the event of an attack. Victims that could quickly restore from backups were in a much stronger position because they could recover their data without paying for a decryption utility.

In response, adversaries began targeting backup solutions, deliberately seeking them out and destroying backups before detonating ransomware. After all, once the adversary gained administrative control over a network, they could often leverage this access to destroy the backup system as well.

Immutable backups, in contrast, cannot be deleted, even by an administrator. While the precise implementation varies by vendor, typically there is a time frame (e.g., 7 days) during which a backup cannot be modified.

Because of their built-in tamper protection, immutable backups are much more likely to survive an incident than their counterparts. It is important, however, that security staff verify that their backups are truly immutable. In some cases, products marketed as “immutable” can still be altered with an administrator account. If an adversary compromises the account, then the backups will likely be impacted along with the rest of the environment.

10.4.3.4 Offsite Backups

There are many benefits to storing backups offsite, including redundancy in the event of a physical disaster, as well as facilitating remote access. Today, many providers offer cloud-based backup services that facilitate quick and easy-to-use deployment and recovery.

The downside is that retrieving and restoring offsite backups can take a long time and eat up bandwidth. Often, IT staff test backups by restoring individual systems, and rarely have an opportunity to attempt a full, system-wide restoration process.

In the event of a major disaster, responders are often shocked by the length of time required to restore data even from offsite backup systems that are fully functional. In some cases, it is faster and cheaper to drive the data over in a station wagon than download it via the Internet (depending on available download speeds and usage pricing). It’s important to ensure that actual recovery times are aligned with the organization’s objectives when selecting backup solutions and developing restoration processes.

10.5 Reducing Risk of Data Theft

Many cyber extortionists steal data, which they then threaten to publish or sell unless the victim pays a ransom. It’s relatively easy to exfiltrate data, and the tools required to engage in data theft often do not trigger antivirus software and network monitoring alerts. As a result, exposure extortion is on the rise, and this trend shows no signs of stopping.

Organizations can quickly and effectively reduce the risk of data theft—and therefore the risk of exposure extortion—by employing the following:

  • Data reduction

  • Data-loss prevention systems

We will discuss each of these in turn.

10.5.1 Data Reduction

When cyber extortionists start to publish data, victims are often shocked at the volumes of data exposed. It is frequently an eye-opening experience, in part because they didn’t realize they were storing such a vast volume of sensitive data to begin with.

The first step in reducing the risk of data theft is simple: Store less of it. Reductions in the amount of data held by an organization correlates with reduced risk. In 2019, Cisco’s Data Privacy Benchmark Study showed that “GDPR-ready” organizations had an average of 79,000 records impacted in breaches with a 37% probability of a high-dollar data breach loss (exceeding $500,000), compared with organizations furthest from GDPR readiness, which had an average of 212,000 records impacted in breaches and a 64% probability of a high-dollar data breach loss. “With fewer records impacted … it is not surprising that the GDPR-ready companies experienced lower overall costs associated with data breaches.”18

18. “Maximizing the Value of Your Data Privacy Investments: Data Privacy Benchmark Study,” Cisco, 2019, www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/dpbs-2019.pdf.

A strong data and asset inventory process is essential for accomplishing data reduction. “Organizations which have done the work to inventory their data have much better visibility to their data, how it is used, and the associated risks,” said Robert Waitman, a director at Cisco’s Security and Trust Office.19 See Section 10.1.1 for more details on conducting an inventory.

19. Dan Swinhoe, “Does GDPR Compliance Reduce Breach Risk?,” CSO, March 19, 2019, www.csoonline.com/article/3369461/does-gdpr-compliance-reduce-breach-risk.html.

Once the data inventory process is conducted, organizations are better positioned to reduce their inherent risk of data exposure by reducing the amount of unnecessary sensitive data they retain. This, in turn, enables defenders to invest in securing a smaller volume of data.

Three key tactics may be used to reduce the volume of stored data:

  • Abstain: Refrain from collecting sensitive data in the first place. To accomplish this, organizations need to understand how data enters their information systems. This typically requires interviews with personnel, data mapping, and process review. Then, identify opportunities for eliminating data collection.

  • Devalue: Replace sensitive information with less hazardous data. Often, this is accomplished using tokenization, such as when payment card numbers in a merchant’s systems are replaced with random strings that cannot be used to make purchases elsewhere.

  • Dispose: Once sensitive data is no longer needed, purge it from the organization’s systems. This seemingly simple activity can be surprisingly challenging to accomplish regularly. It requires that organizations routinely track data, assign responsibility for its disposal, identify information that is no longer needed, create a deletion process for various systems (including hard drives, databases, cloud repositories, and more), and then implement, track, and audit disposal activities.

By reducing the volume of data stored, organizations increase the per-record budget for information security and reduce cyber extortionists’ potential leverage.

Images

Heads Up! Data Is Hazardous Material

Data is a powerful resource that can be used to help or hurt people. Some types of data are sensitive yet commonly used, like oil and gas. Other types of data are practically radioactive.

For decades, organizations around the world have been stockpiling data in enormous quantities, without investing in significant controls. However, most organizations are overwhelmed and don’t have the resources to control the vast quantities of data that they hold, or even know what exactly they are storing. It’s no wonder that huge data leaks hit the headlines on a daily basis—and cyber extortionists take advantage.

10.5.2 Data-Loss Prevention Systems

Data-loss prevention (DLP) tools are software applications designed to identify, track, and protect sensitive data within an organization’s environment. For example, a DLP tool may be configured to identify Social Security numbers in email and block any unencrypted emails from leaving the organization’s network if they contain this type of sensitive information.

DLP solutions can reduce the risk of a cyber extortion event, or even prevent it altogether, by blocking an adversary from exfiltrating sensitive information and generating an alert. Effective DLP solutions come in many varieties, and normally fall into one of three categories:

  • Endpoint: Protects information stored on workstations and servers

  • Network: Monitors data in transit on the network

  • Cloud: Protects data stored in cloud applications

DLP tools are very effective at protecting structured data with a clear and easily recognizable format, but can be less effective for protecting unstructured data such as sensitive, scanned information; intellectual property; or other information that can’t quickly and accurately be identified through automated means.

Consider where your data is stored when selecting and configuring DLP software. For example, data stored in AWS needs to be protected and audited very differently than data stored on a locally accessible file server. While many DLP solutions are designed to operate in one type of environment, other tools can monitor endpoints, the network, and the cloud simultaneously. Prior to implementing a DLP solution, make sure to conduct a data inventory so that you can select the appropriate software and implement it effectively.

10.6 Solving the Cyber Extortion Problem

Cyber extortion is a systemic, widespread issue that can be successfully addressed only through corresponding large-scale changes. Individual organizations can reduce their risk of cyber extortion by employing the prevention and detection measures detailed in this chapter, but certain risks simply cannot be mitigated at an individual level.

It is no wonder that IT staff, security teams, and executives alike often feel discouraged. The problem not only seems far too large for one organization to tackle—it truly is.

In this section, we discuss the large-scale, macro changes that need to occur (and can occur) for cyber extortion to be relegated to the dustbins of history. These measures include the following initiatives:

  • Get visibility.

  • Incentivize early detection.

  • Encourage proactive solutions.

  • Reduce the attackers’ leverage.

  • Increase risk for the adversary.

  • Minimize the adversary’s payoff.

10.6.1 Get Visibility

Only a small percentage of cyber extortion cases ever become known to the public or law enforcement. Extortion cases that have an extreme impact on the public—such as those involving hospitals, schools, and municipalities—might make the news, but (based on the authors’ firsthand experience) a huge number of cases are simply not of great interest to the media or are quietly resolved and fly under the radar. Even when cyber extortion cases are reported, the root cause is rarely publicly identified (and is often unknown), making it difficult to pinpoint widespread risk factors or implement truly effective solutions.

Victims of cyber extortion attacks justifiably fear their cases becoming public, lest they suffer reputational damage, lawsuits, regulatory investigations and fines, or other unhappy consequences. Quite often, victims take great pains to keep their attack quiet, making ransom payments through trusted third parties and hiding behind a veil of secrecy.

There might be legal or regulatory requirements for victims to report, in some cases, but victims are not always aware of these mandates. Reporting requirements vary based on jurisdictions—even within the same country—and might be specific only to industries such as healthcare or banking. Most organizational leaders have little to no experience in managing cybersecurity incidents. As a result, it can be challenging for organizations to understand their reporting obligations on a good day, let alone their worst. In cyber extortion cases, victims are under enormous stress and typically experiencing cash flow difficulties, and leaders are overwhelmed and unprepared. Unless they have access to expertise (through a cyber insurer or experienced IT firm), they often prioritize emergency recovery efforts and never report a cyber extortion event, even if doing so is encouraged or required.

To get visibility into the problem, it’s essential to establish clear, easy-to-understand, widely applicable cyber extortion reporting requirements that are carefully designed so as to not overly burden victims. Everyday leaders need to clearly understand their reporting obligations even in the midst of a cyber extortion attack. Consider including incentives for conducting a root-cause analysis, so that proactive security measures can be appropriately prioritized.

10.6.2 Incentivize Detection and Monitoring

Victims rarely detect cyber intrusions in the early stages. Why? In the physical world, it’s easy to tell that a burglar has entered. A window is broken; drawers have been opened; jewelry is gone. When a thief steals a car, the victim notices it’s missing.

Not so with data. Hackers can quietly gain access to the victim’s network with no obvious signs, and copy information without that action immediately impacting the victim. To trace the hackers’ footsteps, victims have to record their activity. They also have to pay for someone to review the records of activity, which takes time and expertise.

Many organizations do not see strong reasons to invest in effective detection or monitoring. As a result, they don’t have visibility into their own environments. They have no way of detecting a potential cyber extortion incident in the early stages, so they cannot shut down these attacks before large volumes of data are stolen and/or ransomware is deployed. The lack of detection capabilities contributes to the epidemic of cyber extortion incidents.

Certain organizations have more incentive than others to invest in logging and monitoring. For example, in the United States, healthcare providers are incentivized to investigate cyber extortion cases more fully and are more likely to collect evidence since it can be used to “rule out” a breach. In late 2016, the Department of Health and Human Services clarified that for healthcare providers and other covered entities, ransomware cases should be considered a potential data breach unless the victim conducts a risk assessment and demonstrates otherwise.

Incentivize investment in detection and monitoring to nip cyber extortion attacks in the bud and facilitate investigations when they do occur.

10.6.3 Encourage Proactive Solutions

As discussed earlier in this chapter, many cyber extortion attacks are preventable. Looking to public health as a model, risks can be mitigated throughout entire communities with a combination of education, incentives, and direct funding. These are typically implemented as a collaborative effort among government agencies, insurers, and nonprofit organizations. The same type of collaboration needs to occur with cybersecurity to reduce the number of victims and ensure that all organizations have access to knowledge, funds, and resources that can proactively reduce their risk.

Proactive prevention measures are key. Policymakers can, and should, work collaboratively with government agencies, cyber insurers, response firms, IT companies, cloud providers, and more to reduce the risk of cyber extortion attacks.

10.6.4 Reduce Adversaries’ Leverage

As previously discussed, victims can reduce attackers’ leverage in many ways:

  • Develop BCPs to maintain operations during crises (see Section 10.4.1)

  • Roll out disaster recovery processes to mitigate threats to availability (see Section 10.4.2)

  • Implement backups to ensure availability of data (see Section 10.4.3)

  • Reduce the volume of sensitive data stored (see Section 10.5.1)

  • Implement DLP solutions (see Section 10.5.2) to reduce the risk of data exfiltration

All of these strategies can be reinforced and encouraged on a macro scale through government policies, funding, and insurer requirements, among other methods.

That said, one major strategy for reducing adversaries’ leverage cannot be implemented on an organizational level: providing a path to mitigate harm after sensitive information has been leaked. Today, adversaries dangle sensitive information over the cliff of the Internet, threatening to release it to the public unless the victim pays a ransom demand. Frequently, the stolen data includes customer, patient, student, or employee personal information.

Once information is leaked, it may be downloaded, shared, analyzed, leveraged for commercial purposes, and distilled into data products. In many countries, data subjects have little to no control over the use of their personal information once it is leaked.

Lack of consistent regulation over data exchange and use gives cyber extortionists enormous leverage over the victims that they hold hostage. Once sensitive information is released, there is no way to control or undo the damage. When the stolen data affects third parties such as patients, students, and clients, this puts additional pressure on the hacked organization, because victims do not have a way to mitigate harm to these third parties except by paying the ransom demand.

Track and regulate how sensitive data is used, and give people opportunities to control the use of data that affects them. Taking this step would empower society to mitigate the harm of data exposure even after an adversary publishes stolen data, which in turn would reduce cyber extortionists’ leverage over their victims.

10.6.5 Increase Risk for the Adversary

Throughout the history of cyber extortion, adversaries have rarely suffered consequences. When ransomware and cyber extortion attacks began hitting the headlines in 2016, law enforcement agencies were largely stymied by cryptocurrency and the dark web, which enabled cybercriminals to hide their identities and evade apprehension.

As public attention increased, however, so did funding and international coordination. Over time, law enforcement agencies began to make progress in tracking down high-profile cyber extortion groups. For example, in 2021, an international law enforcement operation took down the infamous and prolific REvil ransomware gang’s servers. Other cyber extortionists clearly took note. The Conti ransomware gang issued a public statement on their data leak website about the REvil takedown, complaining: “Is server hacking suddenly legal in the United States or in any of the US jurisdictions?”20

20. Brian Krebs, “Conti Ransom Gang Starts Selling Access to Victims,” Krebs on Security, October 25, 2021, https://krebsonsecurity.com/2021/10/conti-ransom-gang-starts-selling-access-to-victims/.

Despite the irony of the Conti gang’s outrage, the subtext was clear: Law enforcement actions against high-profile cyber extortion groups had been noticed, and the criminals weren’t happy. Around the same time, cyber extortionists were ramping up their recruitment efforts, hiring affiliates and contractors to support their burgeoning industry.

Public reward programs further increased the risk for adversaries. For example, the United States’ Transnational Organized Crime Rewards Program (TOCRP) incentivized reporting.21 Under this program, the U.S. government offered up to $10 million rewards for information about the REvil and Darkside cyber extortion gangs. It is not difficult to imagine that a cybercriminal might be motivated to betray their associates in exchange for millions of dollars.

21. “Transnational Organized Crime Rewards Program,” U.S. Department of State, Bureau of International Narcotics and Law Enforcement Affairs, August 25, 2020, www.state.gov/transnational-organized-crime-rewards-program-2/.

In early 2022, 14 REvil members were reportedly arrested in Russia, resulting in a major public relations blitz that further shook the cybercriminal underground.

It’s important to continue to increase risk (and perceived risk) for adversaries and their ecosystem. By publicly bringing cyber extortionists to justice, law enforcement agencies foster a perception of risk that can deter cyber extortion.

10.6.6 Decrease Adversary Revenue

Cutting off cyber extortionists’ payments has the potential to kneecap their criminal enterprises. This can be accomplished in many ways. For example, there has been much debate about whether ransom payments should simply be outlawed. While this approach might seem straightforward, and therefore attractive, it can have devastating consequences for victims and the communities they serve, as discussed in Chapter 8.

In recent years, law enforcement agencies have successfully clawed ransom payments back from cybercriminals by seizing cryptocurrency wallet keys during raids and intercepting funds stored in cryptocurrency exchanges. For example, in the infamous 2021 Colonial Pipeline case, the U.S. Justice Department seized 63.7 Bitcoins (approximately $2.3 million at the time). “The extortionists will never see this money,” said Stephanie Hinds, acting U.S. attorney for California’s Northern District. “This case demonstrates our resolve to develop methods to prevent evildoers from converting new methods of payment into tools and extortion for undeserved profits.”22

22. Dustin Volz, Sadie Gurman, and David Uberti, “U.S. Retrieves Millions in Ransom Paid to Colonial Pipeline Hackers,” The Wall Street Journal, June 7, 2021, www.wsj.com/articles/u-s-retrieves-millions-paid-to-colonial-pipeline-hackers-11623094399.

Sanctions are another effective tool used to disrupt the flow of money throughout the cyber extortion industry. For example, in 2021, the U.S. Office of Foreign Asset Control (OFAC) ramped up efforts to regulate and penalize cryptocurrency exchanges that cyber extortionists use to store and transfer their ill-gotten gains. While the designation and imposition of sanctions against these types of organizations does not directly solve the cyber extortion problem, it makes it more difficult for adversaries to transfer, launder, and most importantly cash out their ransom payments.

For all these reasons, efforts are needed to further disrupt cyber extortionists’ revenue streams, through payment tracking, identification of illicit intermediaries, sanctions, and other methods.

10.7 Conclusion

Cyber extortion teaches us that we are all connected—for better and for worse. In an instant, a hacker on the other side of the globe can hold a victim hostage. Just as quickly, the hacker’s grip can be released.

The future of cyber extortion will be determined not just by the adversary, but also by society’s reaction. As described in this chapter, there exist effective security tools and techniques that can prevent cyber extortion attacks. Organizations can dramatically reduce their risk by implementing a strong cybersecurity program, deploying security technologies, investing in detection and monitoring, reducing the risk of data theft, and increasing operational resilience.

All of this requires knowledge and funding beyond what most organizations have available today. This is in part due to the rapid adoption of technology throughout every corner of our economy, and a corresponding rush to collect and horde data without fully assessing the risks of doing so. Compounding this challenge is the nascent cybersecurity industry, in which standard best practices are constantly evolving and training programs are not yet mature.

While individual organizations can reduce their risk of cyber extortion by investing in the tools and techniques described in this chapter, the reality is that no one organization can successfully address the problem of cyber extortion alone. Truly mitigating the global cyber extortion crisis will require systemic changes that can only be addressed on a macro scale. Governments need to enact smart, consistent policies to encourage accurate reporting and incentivize positive change. Insurers need to incentivize adoption of effective risk-reduction techniques. Law enforcement agencies need to collaborate globally to dismantle cybercriminal operations and disrupt revenue streams. Everyone must work together to raise awareness and make effective tools and techniques accessible to organizations of all sizes around the globe.

While cyber extortion will never entirely disappear, we can work together to relegate it to the footnotes of our daily lives.

10.8 Your Turn!

Every cyber extortion incident is unique. The response team’s options and priorities will vary depending on the victim organization’s industry, size, and location, as well as the details of the incident itself.

Based on what you learned in this chapter, let’s think through key elements of prevention.

Step 1: Build Your Victim

Choose one characteristic from each of the three columns to describe your victim’s organization:

Industry

Size

Location

Hospital

Large

Global

Financial institution

Midsized

United States

Manufacturer

Small

European Union

Law firm

 

Australia

University

 

India

Cloud service provider

 

Country/location of your choice

Organization of your choice

 

 

Step 2: Choose Your Incident Scenario

Select from one of the following incident scenarios:

A

Ransomware strikes! All of the victim’s files have been locked up, including central data repositories, servers, and workstations.

B

A well-known cyber extortion gang claims to have stolen all of the victim’s most sensitive data and threatens to release it unless the victim pays a very large ransom demand. The gang posts the victim’s name on their dark web leaks site, along with samples of supposedly stolen data.

C

Double extortion! Both A and B occur at the same time.

D

The victim is hit with a denial-of-service attack on its Internet-facing infrastructure that slows its access and services to a crawl. The adversary threatens to continue and even escalate the attack unless a ransom is paid.

Step 3: Discussion Time

After the cyber extortion crisis has been resolved, you are asked to advise the victim’s leadership on how they can prevent similar attacks in the future. Given what you know about the victim and the scenario, answer the following questions:

  1. How is a data and asset inventory useful for reducing the risk of cyber extortion incidents such as the one your victim experienced?

  2. Name one preventive measure that you recommend for the victim and explain why it is important.

  3. What does the term “immutable backups” mean, and why is it important?

  4. Name three elements of an effective business continuity plan.

  5. Why is it important to consider cyber insurance coverage when developing incident response plans, training, and tabletop exercises? Provide at least one example.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset