
Threat hunting
Do you know if cyber attackers are hiding in your network?
Ransomware attacks are seizing headlines more often but the reality is even darker. Most victims globally never appear in the media, since they quietly pay to make the problem go away. The danger is intensifying as threats multiply, their sophistication rises, and the ransoms hackers demand become higher and higher.
In 2020, ransomware cases in Singapore surged 154% and as reported cases more than doubled in the first half of this year, against the same period last year, the Cyber Security Agency of Singapore (CSA) cautioned while noting, ransomware has evolved into a “massive and systemic threat”. The 16,117 cybersecurity cases in 2020 accounted for 43% of all crimes in Singapore. The real number of ransomware attacks in the country could be potentially larger, as many cases may not have been reported.The COVID-19 pandemic has sparked a further surge in global cybercrime cases, with 384 cases reported in Singapore in 2020 alone.
Has your company studied the threats, strengthened its defenses and made a plan in case an attack succeeds? What would you do if tomorrow hackers breach your systems and lock you out of your own data and systems?
Hackers can hold hostage assets such as your customers’ credit card numbers, or critical business processes on which your operations depend, or sensitive data that you are bound by law to protect. A permanent lockout could cripple your operations. A public release of your sensitive data could harm your customers, poison your brand and provoke regulatory scrutiny and heavy fines. Some of the commonly targeted sectors in Singapore are the Technology, Banking and Financial Services, and the Social Networking firms.
To reduce risks, you must act now, keeping in mind these key danger areas:
There’s a cold, hard fact about ransomware: it often pays off. As a result, it’s attracting highly sophisticated cybercriminals and criminal organisations. They’re investing time and money to choose the most lucrative targets and assess how to overcome defenses.
What will make your company a target? Ransomware criminals look at three factors. First, they consider your ability to pay. They often run financial analyses (just as a Wall Street analyst might), research your top executives’ salaries (yes, they know how much you earn) and try to determine if you have cyber insurance. Second, they assess the quality of your defenses. They may probe your cybersecurity capabilities for months before finally deciding on an attack. Third, they consider how much pain they can cause you quickly. If they can rapidly cripple your critical operations, they know that you may have no choice but to pay a larger ransom.
Ransomware criminals will choose the most lucrative and softest targets, so it’s wise to harden your defenses and encourage hackers to look elsewhere. Make your cybersecurity top-notch, with multi-factor authentication on all accounts (including VPN access), robust patching and vulnerability management, up-to-date antivirus and intrusion detection systems, and remote desktop protocols (RDP) that are either disabled or not accessible from the internet.
Understand where your critical data is located, the implications (including regulatory requirements) of any data breach, and what you would need to recover in order to create a ‘minimum viable company.’ Create and check offline backups, along with a robust restore procedure. Define and test how much disruption you can tolerate, so if an attack does succeed, you can make the right decision about paying ransom.
A closer look at ransomware trends in Singapore suggests, while most of the affected cases were SMEs, it was observed that hackers are particularly targeting large companies in the manufacturing, retail and healthcare sectors. 89 ransomware were reported to CSA, with cases hailing from the manufacturing, retail and healthcare sectors. This was a significant rise of 154% in cases over the whole of 2019.
If you are hit, having a plan ready can cut your losses and get you back up and running quickly. Having segregated full and incremental backups available to restore can help you get back in business and reduce operational impact. Otherwise, even if you pay a ransom, recovery may be slow and costly, since IT environments are complex and information about critical systems may be unclear. After ransomware criminals return data and provide decryption keys, it’s all too common for companies that lack a plan to face a long and slow recovery: ransomware tools may have corrupted data and IT teams may not have the needed decryption skills.
Develop and exercise today incident response and crisis plans. Test these plans for a catastrophic ransomware scenario, where common security and IT tools may be unavailable and recovery efforts could require weeks or months. Make sure you have the technical expertise to respond to the attack by determining its cause, investigating its extent, containing the breach and expelling the attacker from your environment.
Much like other parts of the world, ransomware is a major and growing danger in Singapore, against which you must strengthen defenses and develop a response plan, right now. Ransomware criminals are multiplying, attracting new cyber talent, innovating malware, and acting with impunity. To reduce the risks, your defenses and incident response plan must be both top-notch and continually evolving. The right defense plan will also be unique to your organisation: it will consider your critical needs, your current and potential defenses, your vulnerabilities and your organisational ethos.