BID® Daily Newsletter
Jun 17, 2021

BID® Daily Newsletter

Jun 17, 2021

Ransomware Attacks On Community Banks

Summary: Infamous cybercriminals caused the Colonial Pipeline breach and also hacked into three community banks within the same timeframe. Seven tips can help protect your institution, including: educating employees, limiting network exposure, backing up data, automatically updating devices, contacting the FBI if attacked, reminding customers regularly, and keeping resources handy.

Did you know that Henri Matisse’s painting, “Le Bateau”, was hung upside down in the MoMA for a period of time? It wasn’t until a stockbroker who was quite familiar with the painting noticed this and rectified the error. That said, recent events have proven that community financial institutions (CFIs) are not too small to go unnoticed by cyber thieves.
DarkSide and Ragnar Locker are two cybercriminal groups known for hacking into systems, stealing sensitive information, and then demanding a ransom or else posting all of the information. Last month, they posted evidence of a hack into Colonial Pipeline on their sites and then they did the same to three community banks.
In the case of these banks, the evidence posted included screenshots of the banks’ customer databases. The hackers demanded that the banks ante up, in order to stop them from exposing the customer information. These incidents are shocking reminders that financial institutions of all sizes are fair game to these criminals.
While ransomware attacks are not new, the pandemic shutdowns and remote work arrangements have made all financial institutions (FIs) more vulnerable to these types of attacks. Indeed, the industry experienced a 520% surge in phishing and ransomware attacks between March and June 2020, according to a report by security company Arctic Wolf.
In response to this increase and recent attacks, the federal government has stepped up its role in cybersecurity too. It issued an executive order in May providing for more sharing of threat information, modernizing federal government cybersecurity, and standardizing the federal government’s response to cybersecurity incidents, among other actions. 
Similarly, with current events on top of mind, law enforcement officials and cybersecurity organizations are reminding FIs what they can do to stay ahead of ransomware attacks. 
  1. Educate employees. Staff should be regularly updated on the latest threats, including warning signs and safe practices to help prevent ransomware from infiltrating the institution’s system.
     
  2. Limit network exposure. Only authorized users should be able to install and run software applications on network devices. Also, be sure to implement network segmentation best practices.
  3. Back up data. Ransomware attacks prevent institutions from accessing the stolen data. So, a best practice is to store a backup of the data on a separate device or offline that can be accessed, if such an attack were to occur.
  4. Automatically update all devices used by staff. Antivirus and anti-malware solutions should be kept up-to-date. Institutions should conduct routine scans to make sure these solutions are doing their jobs.
  5. Contact the FBI if attacked. You can find the FBI office nearest you on the FBI field offices page. 

  6. Remind customers regularly. Don’t assume that all customers are well versed in cyber risk. CFIs should regularly update their customers on the ways to stay safe. A few reminders include:
  • Tell customers to not open emails or attachments they don’t recognize
  • Keep an offline backup of personal information
  • Maintain the latest security software, web browser, and operating system and turn on automatic updates.
  • Enable popup blockers

7. Keep helpful resources handy. The below resources are good ones to review on a regular basis to help prepare for cyber threats from ransomware attacks. 
Ransomware can wreak great havoc, so it is imperative to stay on top of cyber threats. This is not a one-and-done process. Continuous monitoring of threats, educating of employees and customers, and safeguarding of systems are necessary to combat these cyber thieves and stay safe.
Subscribe to the BID Daily Newsletter to have it delivered by email daily.

Related Articles:

Climate Risk Management Lessons from the Fed’s Pilot Analysis
The Federal Reserve recently published the results of its 2023 pilot climate scenario analysis conducted with six of the largest US banks. We discuss some of the Fed's key findings.
Don’t Overlook the Risks of AI-Backed CRMs
AI-backed CRM systems offer major benefits, but they also involve risks. We outline the challenges of using AI for customer service and share training and security tips to minimize risks.