Cleveland Hopkins International Airport In U.S fell victim to a cyber attack on April 29th and officials have confirmed its a ransomware that had affected their systems for a while.
There wasn’t any flight delays and security check hindrances but 95% of the systems went offline.
On April 21, the malware was discovered on the airport’s computer servers. The systems that handle flight and baggage displays and email were affected.
Right after the attack, ransomware has requested the officials to reply with a mail but instead, Donald Phillips, Chief Information Officer of Cleveland and his team went ahead and fixed it all by themselves.
Ransomware threats could chaos to organizations, and Cleveland must be lucky because Albany, New York, and Flordia all suffered the ransomware and have paid a lot of money to get out of this.
“We were giving you what we knew at the time,” he said.
“Phillips acknowledged that he considers the malware involved to be a form of ransomware. He said the city was asked by the malware to respond to an email address for more information about the hack but the city did not respond.”
According to crainscleveland , the malware impacted computers linked to the Hopkins email, payroll, and digital records systems.
Download Free E-book to learn about complete Enterprise Security Implementation & Mitigation Steps – Download Free-Ebook Here.
Why is Ransomware scarier now
Ransomware has always been a threat for cybersecurity professionals, with new variants and types developed every day this has become a never-ending routine for IT, administrators, to prevent them from causing havoc to their business.
With more data
protection laws coming into force, organizations need to make sure they keep
ransomware out of their network else they need to face huge consequences, the
penalities and brand degradation in the market. Facebook is one such
organization who did fail to keep their users personal data secured, and now
being sued by different countries for their non-compliance over data
Ransomware trends to watch for in 2019
will continue to grow in numbers, but not all campaigns would be effective
enough to last long. In Jan 2017, there were 635 campaigns, in Feb 2018 it was
1105, and in Jan 2019 it was 1453
attacks can rely on RDP for takedowns, the recent takedown of xDedic
marketplace exploited RDP service. Apart from that the SamSam, BitPaymer and
CrySiS all used RDP and were developed in such a way that they can use any
other service that is available for them to switch between computers
has already came in number of different versions and is expected to grow
further, thanks to its versatile nature.
Ransomware will be
deployed after blending it with other campaigns for effective penetration.
Methods like cryptojacking can be used for successful deployment of the
ransomware. Heremes and Ryuk ransomware are one such example.
Ransomware visit to Norsk Hydro and Arizona Beverages
Norsk Hydro also became victim to a ransomware attack this year and have lost $40 million because of it. NotPetya the ransomware that took Maersk out for a couple of days has been the convict here in case of Norsk Hydro as well.
Though cyber insurance companies have claimed to bear the cyber damages, it’s highly unlikely to happen as Norsk Hydro was hit be pretty old ransomware that was out in wild in July 2017.
became victim to iEncrypt ransomware, leaving the company to halt its
operations meanwhile. Close to 200 servers were affected, and the staffs were
not able to process the orders over systems hence they went ahead to do it
Lessons learned to defend against ransomware threats
Like Wiseman once said ‘Prevention is better than Cure’. An organization needs to go proactive to build its defenses against ransomware.
- Keep your operating systems and
- Remove unwanted/unrecognized software
from your network
- Blacklist and whitelist applications
for secured operations
- Security configurations for browsers
- Monitor and secure the browser
extensions and plugins
- Honeypot systems can be employed for
- Segment IT infrastructure based on the
critical and non-critical devices
- Manage remote devices and their
- Block the ports if in case the
ransomware exploits one
Businesses need to educate their employees about cyber best practices, like how and why they should avoid opening attachments from an unknown sender. Cybersecurity awareness across the organization can give an upper hand to the organization. Apart from that its good to keep a patch management system and data security management procedures in place to avoid ransomware threats.