If you’ve been watching the news, it’s no surprise that criminals are getting more innovative with their cyberattacks. They’re going after your security tools, targeting your backups, breaching your security vaults, and more. In this blog, we’ll dive into three cybercrime case studies, examine the new tactics criminals used in recent cybersecurity attacks, and explore the top security control you can use to reduce your organization's risks.
Case Study 1: The IHG Hotel Chain Cyberattack
Last month, the parent company of the Holiday Inn, IHG, was the victim of a destructive attack that shut down their computer systems. It turns out they were hacked by a criminal couple from Vietnam, who broke in and attempted to install ransomware. According to BBC News, which interviewed the criminals, the couple sent a phishing email containing a “booby-trapped” email attachment. Some reports indicate that the couple also had to “bypass an additional security prompt message sent to the worker’s devices as part of a two-factor authentication system.” Multi-factor authentication (MFA) bypass attacks, such as the one used in the IHG attack, are an increasingly popular attack tactic. In fact, a similar MFA fatigue attack—where the criminals unceasingly send MFA verification requests to the user’s cell phone until they finally click one and enable the criminal to bypass authentication security -was also recently used in the September Uber attack.
The criminals in the IHG attack claim that once they were in the IHG environment, they were able to access the company’s internal Outlook emails, Microsoft Teams chats and server details. In addition, they say they found an improperly stored password that they were also able to leverage, although IHG denies this claim. The couple planned to deploy ransomware, but IHG’s security systems blocked their attempt, so the couple decided to simply delete the data instead.
The end result? Not only were IHG’s customers inconvenienced by the system downtime, but the company’s bookings plummeted after the attack. While the average worldwide total cost of a data breach is a staggering $4.35 million USD, the reputation damage and loss of customer and partner trust can add to the already painful losses and cripple an organization.
Case Study 2: BlackCat Attacks a NYC Company
BlackCat is a prominent ransomware gang that has also attacked a German oil supplier and an Italian energy agency. Many in the industry think BlackCat is a rebrand of the DarkSide gang—the criminals responsible for the Colonial Pipeline attack.
BlackCat is known for leveraging ransomware as a service (RaaS). RaaS is a criminal version of the business franchise or affiliate model. As with any franchise model, there can be varying levels of guidance, tools and materials involved, but the result is the same—it ensures criminals no longer need to be skilled developers to launch successful ransomware attacks. The kits can also come with customer support and access to extortion sites to pressure the victim and receive payment. For more details, read this RaaS blog or take a deep dive into criminal marketplaces by watching this video on How the Dark Web Works.
One of BlackCat’s recent cybersecurity attacks targeted a 150-person company based in New York City. Many employees were working remotely, and they were confused when they experienced a sudden, marked slowdown in remote access. Sadly, two days later they discovered why. Criminals had been exfiltrating their data and then ultimately detonated a ransomware attack.
The criminals entered the company’s environment through an old, unpatched vulnerability in the Citrix VPN. They spread throughout the network using stolen passwords and common IT tools, rather than malware—a growing trend that today’s criminals frequently use to avoid detection. Many of today’s criminals also look for the victim’s financial data and cyber insurance coverage before they deploy ransomware. This enables them to analyze the victim’s finances and insurance coverage limits in order to ensure they ask for the maximum possible payment.
Case study 3–-Suffolk County, NY Faces Comprehensive System Lockdown
BlackCat has been busy—another of their recent cybersecurity attacks targeted New York’s Suffolk County. The criminals crippled the IT systems, email, and websites, as well as 911 services—reducing them to phone calls and hand-written records. In addition to locking down their systems, BlackCat stole and threatened to publish 4TB of data unless the ransom was paid. This likely includes all sorts of personal and financial data. While these extortion exposure tactics have been around for a couple of years, it is likely to continue to remain a popular tactic moving forward.
In a new twist, BlackCat has a newly updated toolkit which includes advanced features, such as automatically extracting passwords from backups. BlackCat also attacked Suffolk County’s backups and stole the passwords, so they could not easily restore their data. (This is a prime example of why organizations need to carefully configure and protect backups and cybersecurity tools.) But BlackCat did not stop there, they also turned this into a supply chain attack and compromised and encrypted the networks of several of Suffolk County’s contractors as well. When the ransom was not paid as requested, they posted some of the data.
This attack is made even more difficult because BlackCat is using the Rust programming language for their ransomware. Rust is a very secure language that creates a faster, more portable ransomware product, and makes recovery efforts notably harder. As you can see from these recent cybersecurity attacks, Ransomware-as-a-Service enables criminals to attack many more targets using a single infrastructure.
Lessons Learned from Recent Cybersecurity Attacks and 6 Keys to Reducing Risks
As we can see in these case studies, criminals will continue to innovate to create stronger ransomware programs and tactics. It’s not possible to stay ahead of every zero-day exploit and human error that can open the door to a cyberattack. But there are multiple different strategies you can use to reduce your organization’s risk. Let’s take a quick look at the top strategies.