Downturn in Ransomware Attacks?

Downturn in Ransomware Attacks?

As much as it would be great to declare a downturn in ransomware attacks on critical infrastructure it seems premature to do so. The frequency chart based on the CIRA dataset indicates successful attacks every 2 or 3 days is more of a new normal.

Whether the law of averages applies is a fair question (I am doubtful, but time will tell).

It’s also likely that ransomware attacks are under reported. Coming rules in accordance with the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) are intended to address this issue. ?

Uniform incident reporting rules are welcome, especially the explicit focus on rapid reporting of ransom payment. Payment fuels the illicit market and is arguably where government is uniquely positioned to trace payment and identify attackers.

The CIRA dataset makes a best effort to track paid status. Unfortunately, paid status updates are late if at all. It's also nice to see which organizations refused to pay.

CIRA also attempts to track incident duration. Although organizations that recover rapidly are still underrepresented in the data set there are links provided to find more information.

You might have other questions of interest. Perhaps we'll never have the data to answer with confidence but here are a few questions that come to mind for me:

  • What factors explain chronic attacks on government, healthcare, and education facilities?
  • Does under reporting really explain fewer attacks on 'for profit' organizations?
  • Is lack of successful attack on NERC responsible entity because of the CIP standards?

We'll always want more data to drive actionable insights. In the meantime, the available data shows that ransomware attacks on critical infrastructure continue to affect the global community.

Call to Action

Short term, consider starting the year with a renewed effort to check backups for your important systems and industrial applications. Engage your technology supplier to review recovery plan for complex systems.

Medium term, identify your coalition to participate in the CIRCIA rule making process. Trusted advisors such as your sector ISAC could help ensure reporting rules make sense for all stakeholders.

Finally, critical infrastructure organizations will continue to invest in defensive initiatives. As feasible leverage Consequence-driven Cyber-informed Engineering (CCE) or similar methodology to reduce the potential impact of a ransomware attack. ?

Bryan Owen

Head of Product Security at AVEVA

2 年
回复

要查看或添加评论,请登录

Bryan Owen的更多文章

  • Key Takeaways from S4x25

    Key Takeaways from S4x25

    #S4x25 continues to draw an unprecedented gathering of OT security practitioners. It’s exciting and inspiring to engage…

    5 条评论
  • Dependency on WebP is a web of complexity

    Dependency on WebP is a web of complexity

    The swift response by maintainers of libwebp is to be applauded but the software development community has much more to…

    1 条评论
  • Crisis of Confidence in US Critical Infrastructure

    Crisis of Confidence in US Critical Infrastructure

    Cybersecurity events, especially those associated with destructive malware, sadly have become commonplace. Whether…

    6 条评论
  • 10 Security Tips for Building a New Daily Driver PC

    10 Security Tips for Building a New Daily Driver PC

    Working from home has sparked demand for technology including new PCs. PC hobbyists, like you, find excitement and…

  • 2020-02 Open Letter to the US Cyberspace Solarium Commission

    2020-02 Open Letter to the US Cyberspace Solarium Commission

    Optimistic remarks about the US Cyberspace Solarium Commission by Tom Fanning, CEO Southern Company, at the 2019 NERC…

    12 条评论

社区洞察

其他会员也浏览了