Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

3/11/2020
05:50 PM
50%
50%

Ransomware Increasingly Targeting Small Governments

To get back up and running quickly, and because it's cheaper, city and county governments often pay the ransom, especially if insurance companies are footing the bill. The result: More ransomware.

Small and local government have not only continued to pay ransoms to the criminals behind ransomware, but they have been doing so at an accelerating pace, according to a new report by consulting firm Deloitte.

In 2019, more than 163 ransomware attacks targeted local and county governments, with at least $1.8 million paid to the cybercriminals behind the attacks and tens of millions of dollars in recovery costs, according to data compiled by the Deloitte Center for Government Insight. In 2018, there were only 55 publicly reported attacks and less than $60,000 in ransom. In fact, local governments are seeing an increasing number of attacks at the same time attackers are also demanding higher ransoms — an average of 10 times higher than what they demand from private-sector companies.

Three unique facets of local governments are likely driving the increase in ransomware cases: The organizations tend to have insurance, they leave gaps in their networks and system security, and they need to maintain critical services. The result is a feedback loop, says Srini Subramanian, state and local government sector leader for Deloitte.

"The more they are paying out, the more money criminals are demanding," he says. "The criminals like targeting governments because they pay. And cyber insurance is paying because it is the fastest way to recovery, and it is likely the most cost-effective way as well."

Local governments became a favored target of ransomware in 2019. In August, local and county government organizations in Texas were disrupted by destructive attacks all at nearly the same time and with a variety of consequences — some towns lost the ability to accept payments, while others had emergency services disrupted. Major cities, such as Baltimore and Atlanta, suffered attacks as well. 

Just this week, Durham, NC, acknowledged fighting a ransomware attack that compromised a system after employees clicked on phishing e-mails. The attack appears to have affected 1,000 systems at the county government offices; the IT staff reportedly plans to reimage the systems.

Because local governments have tight budgets and lack the ability to attract cybersecurity professionals, they are an easy target, says Cesar Cerrudo, chief technology officer of cybersecurity services provider IOActive.

"It's easier mostly because they have poor backup practices in large part due to the lack of budgets and skills," he says. "Local governments also need the systems for normal operations, and when they can't restore from a backup, then they only have two options to continue with a nonfunctioning system or to pay the ransom."

The critical nature of many government systems means that failure to recover quickly can result in significant costs. The city of Baltimore, for example, decided not to pay a ransom of $76,000. It was the right moral choice but one with a significant cost, says Deloitte's Subramanian. Recovering from the incident cost the city more than $18 million.

Both private- and public-sector organizations should improve their system architectures to make fast recovery more likely, educate the workforce to improve cyber hygiene, and practice response drills and what-if scenarios to ensure proper insurance coverage, he says.

"You need to be able to go to your business leaders and with confidence say, 'We will be able to restore within 24 hours, or 36 hours, or 48 hours,'" Subramanian says. "When people are able to have a response plan and test it, then we can stop paying."

As the Durham, NC, incident has shown, phishing remains a significant vector for ransomware, making employee security education important. In 2019, 56% of public-sector organizations saw an increase in phishing attacks that included a malicious link or attachment, according to security firm Mimecast.

The federal government could help local agencies with cybersecurity education, best practices, and incident response expertise, says IOActive's Cerrudo.

"The private sector has been investing in cybersecurity for a long time and continues to mature, while local governments haven't invested much," he says. "Knowing this, cybercriminals are turning their weapons and targeting local governments because they are easier and juicier targets."

While local governments that pay a ransom can recover fairly quickly, the model is not sustainable. Eventually, serial local-government victims will no longer be acceptable risks for insurance companies, Subramanian says. 

"It is going to happen sooner or later, and when it does, it remains to be seen if they are insurable after the second time or third time that they pay ransom," he says. "The question is that, as the guardians of taxpayer money, what should the governments be doing today?"

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "Keys to Hiring Cybersecurity Pros When Certification Can't Help."

 

Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20331
PUBLISHED: 2021-05-13
Specific versions of the MongoDB C# Driver may erroneously publish events containing authentication-related data to a command listener configured by an application. The published events may contain security-sensitive data when commands such as "saslStart", "saslContinue", "i...
CVE-2021-31215
PUBLISHED: 2021-05-13
SchedMD Slurm before 20.02.7 and 20.03.x through 20.11.x before 20.11.7 allows remote code execution as SlurmUser because use of a PrologSlurmctld or EpilogSlurmctld script leads to environment mishandling.
CVE-2020-36197
PUBLISHED: 2021-05-13
An improper access control vulnerability has been reported to affect earlier versions of Music Station. If exploited, this vulnerability allows attackers to compromise the security of the software by gaining privileges, reading sensitive information, executing commands, evading detection, etc. This ...
CVE-2020-36198
PUBLISHED: 2021-05-13
A command injection vulnerability has been reported to affect certain versions of Malware Remover. If exploited, this vulnerability allows remote attackers to execute arbitrary commands. This issue affects: QNAP Systems Inc. Malware Remover versions prior to 4.6.1.0. This issue does not affect: QNAP...
CVE-2021-28799
PUBLISHED: 2021-05-13
An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3...