Scroll Top

Ransomware – After The Costliest Year of Ransomware The Justice Department is Aiming Efforts to Combat the Attacks

SMB Ransomware

WASHINGTON (AP) — The Justice Department is taking new aim at ransomware after a year that officials say was the costliest on record for the crippling cyberattacks.

Formation of a task force of FBI agents and Justice Department prosecutors is an acknowledgment of the growing threat posed by ransomware attacks, in which hackers lock up computer data and demand ransom payments in order to give it back. The force is part of a broader government effort to combat cyberattacks that target vital infrastructure, including a 100-day Biden administration initiative announced Tuesday to bolster the digital security of the nation’s electricity supply.

Ransomware attacks have impeded hospital operations, led to the temporary closure of school classes and caused other chaos. Last year was the worst to date in terms of the economic toll, with ransom demands to victims averaging over $100,000 and in some cases totaling tens of millions of dollars, according to the Justice Department.

“Ransomware can have devastating human and financial consequences,” John Carlin, the acting deputy attorney general, wrote in a staff memo dated Tuesday and provided Wednesday by the Justice Department. “When criminals target critical infrastructure such as hospitals, utilities, and municipal networks, their activity jeopardizes the safety and health of Americans.”

Lisa Monaco was confirmed Tuesday evening as the department’s new deputy attorney general.

The Justice Department has brought indictments related to ransomware attacks, including a 2018 case against two Iranian nationals whose many victims included the cities of Atlanta and Newark, New Jersey, and resulted in losses of $30 million. Federal prosecutors have also accused North Korean computer programmers of creating a global ransomware campaign dubbed WannaCry 2.0.

But the threat has grown more sophisticated.

As it imposed sanctions on Russia last week for election interference and the hacking of federal agencies, the Treasury Department alleged that Russian intelligence had enabled ransomware attacks by cultivating and co-opting criminal hackers and giving them safe harbor.

Against that backdrop, the task force is aimed at enhancing the department’s ability to disrupt ransomware attacks and prosecute the hackers responsible for them, including through more training and resources and a greater focus on intelligence. Another purpose is to improve partnerships with the private sector, including by encouraging victim companies to come forward and report attacks, and with other federal and international agencies.

The task force will include representatives from the Justice Department’s criminal and national security divisions, among others.

Recent Ransomware Attacks and Data Breaches:

  • Haverhill, MA Public Schools
  • University of Vermont Health Network Burlington, VT
  • APPLUS SASS Provider to Massachusetts Registry of Motor Vehicles Causing Major Outage to Car Inspection System
  • Virtual Care Provider, Inc. (VCPI) affects 110 Nursing Homes and Acute Care Sites keeping them from Accessing Electronic Health Record Data. Ransom Demand = $14 Million in Bitcoin.
  • Quanta a supplier to Apple has Ransomware and the demand is for $50 Million
  • SolarWinds Hack of  18,000 Government and Leading Industry Companies – Commerce, Treasury and Homeland Security Departments, Cisco, Intel, Fireye, etc.
  • Electric and Water Utility Hacks – New York Power Authority, Pacific Gas and Electric Co., Oldsmar Water Treatment Plant, Israeli Water System Attack Thwarted

Tips for Fighting Ransomware Attacks and Data Breaches

  • Don’t Pay The Ransom
  • Institute Documented Acceptable Use Policies Describing What Employees Can’t Do On Company Computers and Networks
  • Train and Test Employees on Cybersecurity
  • Ensure Data is Being Backed Up Consistently
  • Test Backup Restore Functionality
  • Perform a Disaster Recovery Exercise
  • Make Sure Virus Software is Up To Date and that Employees Do Not Have Administrative Access Credentials to Shutoff Virus Software.
  • Have Topgallant Test Computing/Network Hardware and Applications to Identify all Vulnerabilities and Exploits.  Remediate Findings and Re-test

#ransomware, #hack, #cybersecurity, #HIPAA, #HITECH, #securitybreach, #riskassessment, #penetrationtest, #vulnerabilityassessment, #trainingandawareness,  #privacy, #phishing, #malware, #trojan, #virus, #backup, #disasterrecovery, #tabletopexercise, #itcontrols, #cybersecurityframework,

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.