BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Could A Colonial Pipeline-Style Cyberattack Disrupt Your Business?

Could A Colonial Pipeline-Style Cyberattack Disrupt Your Business?

The Colonial Pipeline ransomware attack garnered national headlines after hackers caused widespread gasoline shortages along the Eastern U.S. seaboard. Among the hardest hit, North Carolina saw more than two-thirds of local pumps closed, and 80 percent of fueling stations in the nation’s capital ran dry.

Images of long gas lines and the reported $4.4 million ransom paid to the criminal organization known as DarkSide highlight the fact determined cybersecurity has never been more essential to corporate survival. The question business leaders may want to consider right now is whether sophisticated cybercriminals could penetrate your defenses and disrupt operations.

Colonial Pipeline Ransomware

How Devastating Are Ransomware Attacks on Businesses?

The internet provides digital thieves a global reach, and penetrating outfits such as Colonial Pipeline represent just the tip of the spear. DarkSide reportedly forced 47 business decision-makers to hand over upwards of $90 million in Bitcoin payments on the dark web alone, according to reports. If that figure raises concern that your organization could be hit in the near future, cybercrime statistics offer no solace.

A recorded 304 million ransomware attacks were orchestrated in 2020, representing a 62 percent increase from the previous year. The average ransomware demand topped $233,000, with hackers routinely negotiating higher payoffs from more lucrative corporations. Approximately 1 out of every 5 small businesses are the focus of an attack and 80 percent of mid-sized outfits are targeted by cybercriminals in this fashion. While hacks that create widespread disruption such as the Colonial Pipeline make national news, companies often close for two weeks even if they pay the ransom. It’s also not unusual for digital business hijackers to take the cryptocurrency money and not provide the decryption code necessary to restore operations.

Although media outlets reported that DarkSide was shuttering its underworld activities after accumulating substantial wealth, business professionals have every reason to be even more afraid of what comes next. What non-cyber security experts may not be aware of is that DarkSide does not typically lead to ransomware attacks. Its group of online miscreants operates what technology experts call “ransomware as a service.”

That means they craft malicious software for others inclined to target an organization. If your business has international rivals or appears like low-hanging fruit to anyone online, they could task DarkSide or another digital mafia outfit with creating a ransomware file to upend your company.

How To Protect Your Company From Cyberattack Disruption

The Colonial Pipeline hack illustrates the fact that companies with substantial resources can fall prey to a nefarious individual if they let their guard down for a second. Ransomware attacks, like other incursions, typically stem from some type of human error. In many cases, cybercriminals target wide-reaching organizations by sending out thousands of emails laced with malware. Sophisticated hackers such as DarkSide may employ social engineering to gain the trust of someone with access to the network. Once an employee falls for the trickery, they may divulge network access information and a hack ensues. The critical point is that people too often make innocent mistakes and that’s why the following measures remain mission-critical.

  • Require employees to use strong passwords.
  • Mandate password updates on a regular basis.
  • Have a cybersecurity firm integrate multi-factor authentication technology.
  • Ensure all devices possess commercial-grade firewalls and antivirus software.
  • Implement “zero trust” network policies that limit employee access.
  • Deploy virtual private networks for remote workers.
  • Provide ongoing cybersecurity awareness training to all personnel.
  • Create a system of cyber-threat alerts for imminent dangers.
  • Back-up all digital assets to the Cloud and redundant hard drives out of hackers’ reach.
  • Conduct cybersecurity audits that include penetration testing.

Despite the splashy Colonial Pipeline headlines, many industry leaders continue to lag in cybersecurity vigilance. According to research, only 57 percent of decision-makers had a cybersecurity risk assessment conducted in 2020. That may be why nearly 80 percent reportedly lack confidence their operation could withstand a cyber assault.

Business leaders have a rare opportunity to learn from the Colonial Pipeline and avoid disruption. By enlisting the support of an experienced cybersecurity firm, the necessary defenses and employee awareness training can be implemented promptly. In a world in which an Eastern Bloc hacker can attack any company on the planet, hardened cybersecurity defenses are job one.

More Like This

Cyber Criminals Are Actively Exploiting a WordPress Plugin Zero-Day

Cyber Criminals Are Actively Exploiting a WordPress Plugin Zero-Day The Fancy Product Designer plugin — commonly used to configure visual products on WordPress, Shopify, and WooCommerce — has been compromised. Cybercriminals are actively looking for sites that use this plugin so as to exploit a recently-discovered vulnerability. What Is a Zero-Day Exploit? The term zero-day …

Cyber Criminals Are Actively Exploiting a WordPress Plugin Zero-Day Read More »

Read More

AA21-148A: Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs

Original release date: May 28, 2021 Summary The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are responding to a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental organizations (NGOs). A sophisticated cyber threat actor leveraged a compromised end-user account from Constant Contact, a legitimate email marketing software …

AA21-148A: Sophisticated Spearphishing Campaign Targets Government Organizations, IGOs, and NGOs Read More »

Read More

How to Reinstall macOS on Your Computer

How to Reinstall macOS on Your Computer If your Mac has been having problems or behaving erratically as of late, it might be time for a fresh install of macOS using Recovery mode and Disk Utility. A new install may also be useful if you have plans to give away or sell your Mac. In …

How to Reinstall macOS on Your Computer Read More »

Read More

Understanding the Role of Non-Fungible Tokens (NFTs)

Understanding the Role of Non-Fungible Tokens (NFTs) Non-fungible tokens or NFTs are rising in popularity as more people discover their importance. These tokens come with unique metadata and identification codes, making it easier to distinguish individual tokens. Unlike digital currencies, such as Bitcoin and Ethereum, you cannot trade or exchange NFTs. They are cryptographic assets …

Understanding the Role of Non-Fungible Tokens (NFTs) Read More »

Read More

AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks

Original release date: May 11, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) are aware of a ransomware attack affecting …

AA21-131A: DarkSide Ransomware: Best Practices for Preventing Business Disruption from Ransomware Attacks Read More »

Read More

Key Insights From Cybersecurity Trends and Stats for 2021

Key Insights From Cybersecurity Trends and Stats for 2021 Cybercrime is a hot topic that makes news headlines and attracts the corporate world and individuals’ attention. According to the Federal Bureau of Investigation (FBI), there was a 75 percent increase in breaches since the Covid-19 health crisis started through June 2020. On the other hand, Google reported …

Key Insights From Cybersecurity Trends and Stats for 2021 Read More »

Read More