Do not pay when you’re hacked

It’s impossible to read the news without seeing at least one headline blaring about a breach, hack or attack.

Successful remediation of the impact of a cybersecurity attack depends entirely on the plans your CISO has in place to protect your business and your information.

It’s impossible to read the news without seeing at least one headline blaring about a breach, hack or attack.

In the USA, the Colonial Pipeline experienced a Darkside ransomware attack that affected more than 10 000 filling stations.

Virgin Active was hit by a hack in early May and took weeks to re-establish its systems.

Vastaamo, a platform that provided therapy to thousands of patients, lost its data to hackers thanks to an unexpected security flaw.

The hackers sent ransom demands to patients, pay up, or your personal information is public knowledge.

ALSO READ: Community rally together to help Epworth Home

As Stephen Osler, co-founder and business development director at Nclose, pointed out, the criminal networks and masterminds behind digital attacks are doing their jobs and have every motivation to do these jobs extremely well.

“The sheer volume of events is a concern,” he said.

“The threat actors and the methods they use are increasingly sophisticated and complex, taking advantage of even the slightest gap in a company’s defenses. Many attacks are extremely malicious, and some are driven by intentions other than just money or data. But, and this is really important, don’t panic and don’t pay the ransom.”

For Osler, the first and most important step the CISO should take is to set your disaster recovery (DR) and business continuity plan (BCP) in motion by notifying leadership.

Transparency is key, as is full insight into how serious the compromise may be, and the challenge that lies ahead.

The next step is to contain the breach.

Determine which servers and systems have been infected and contain them as quickly as possible to minimise the damage and the spread. Notify the teams and get people off the network as fast as possible, from the mobile device to the server mainframe.

“Once you’ve contained as much of the breach as possible, you need to identify the source,” said Osler.

“It’s absolutely critical to identify how this got into the organisation and the level of access that the hackers have. Even if you switch everything off and rebuild everything from scratch, you still need to know how they got in so you don’t add that vulnerability straight back into the business. Find patient zero.”

At this point, you shouldn’t have paid the ransom.

Hackers are unethical to start with, there’s no guarantee that they won’t withhold services despite payment, as they did in the Colonial Pipeline attack, or simply sell your data anyway.

Payment also paints a big, red bullseye on the back of your business, and perhaps your whole industry.

“If you pay, the hackers will look at other companies in your sector and simply replicate their success story with someone else,” said Osler.

“And they may come back to you for more. Payment is a risk; non-payment is a risk. Either way, you’ve been hacked and you need to have plans in place to protect your business and your information.”

This means the BCP and DR strategies for any business need to be tested, as far as they can be, rigorously.

Companies need to have put defined processes in place for remediation, and that your detection systems are as cutting edge as they can get.

No business or system is perfect, it’s like hitting a moving target that changes shape every 10 seconds, but having the right procedures in place can help you minimise the damage done.

“Learn lessons from the attack and use failure as an opportunity to learn from mistakes, to close loops and to add in additional controls,” said Osler.

“Double-check the policies, see what worked and what didn’t, and adapt internal training and systems to improve your security posture as thoroughly as possible. Most importantly, don’t panic and pay. Plan, protect, and plan some more.”

Contact the newsroom by emailing: Marietta Lombard (Editor) germistoncitynews@caxton.co.za,  or (Journalists) Busi Vilakazi busiv@caxton.co.za

Exit mobile version