BID® Daily Newsletter
Dec 12, 2024

BID® Daily Newsletter

Dec 12, 2024

Protecting Your Institution as Ransomware Ramps Up

Summary: Ransomware attacks hit a speed bump in 2022. But the respite was short-lived. Ransomware attacks rose again in 2023, so this is no time for banks to let their guard down.

In May 2021, Colonial Pipeline, which provides oil and gas to the Southeast, got hit with a major ransomware attack. The firm had to shut down its pipeline, causing fuel shortages, and eventually paid a ransom of $5MM in Bitcoin to regain control over its data and systems. What got lost in the brouhaha is that at least three community financial institutions (CFIs) were also hit with ransomware attacks that month.
A Ransomware Primer
Ransomware consists of malicious software that is secretly installed on a business computer system and then used to disrupt operations by blocking access, encrypting data, or stealing data. The attacker demands ransom payments in exchange for undoing the attack or stopping the release of sensitive stolen data.
Windows operating systems are the favored target system by a wide margin, with Linux in a distant second. MacOS remains one of the least likely targets.
Attackers gain access in various ways, from phishing emails to back-door computer break-ins to compromised credentials. There is no magic bullet to prevent such attacks, and the ranks of those involved keep growing and gaining in sophistication, thanks in part to artificial intelligence.
Two years ago, bankers got some rare, good news in the battle against cybercrime: ransomware attacks dipped. There was some hope that the small decline in 2022 was the start of a retreat in ransomware attacks, possibly the result of strengthened defenses and more awareness by organizations.
But it was a very short respite. Ransomware attacks are on the march again. Research from ThreatDown’s 2024 State of Ransomware publication shows that between July 2023 and June 2024, ransomware attacks increased 33%. According to one survey, reported ransomware payments reached a record $1B in 2023, but the total may likely be higher since not all ransomware payments are reported.
Another telling statistic is a surge in posts to data leak sites, which ransomware attackers use to post sensitive stolen data as part of extortion attempts. There was a 75% jump in these types of posts in 2023 over 2022. All this suggests that 2022 was an anomaly, as some cyber crooks who were disrupted by countermeasures are back in action while new players have appeared. Some enterprising cybercrooks now offer ransomware-as-a-service on dark websites.
Who’s at Risk
While attacks against large enterprises and financial institutions make the news with their multi-million-dollar payouts, many, many more small and medium-sized businesses and CFIs are the victims of ransomware attacks. Hornet Security’s 2024 Ransomware Attacks survey revealed that 55.8% of ransomware attacks reported were from businesses with 1-50 employees.
Financial institutions have become a prime target. In 2021, 34% of financial institutions worldwide reported a ransomware attack; in 2024, that number has nearly doubled to 65%. It stands to reason that financial institutions that haven’t experienced a ransomware attack are now a distinct minority.
Exactly how widespread this problem is among CFIs is unclear. In 2022, ransomware hackers identified via dark web blogs that seven CFIs in six states had been victims of ransomware after those May 2021 attacks. However, it’s uncommon for ransomware hacking groups to post details about attacks while negotiations are ongoing, meaning that the actual numbers may be higher. As a result of escalating attacks, several regulators approved a final rule in November 2021 that required affected financial institutions to notify regulators of cyber incidents within 36 hours of identifying that an attack has occurred.
What You Can Do About Ransomware Attacks
The best offense is a strong defense. Here are five ways to harden defenses against ransomware attacks and plan for recovery, if one does occur:
  1. Back up all data regularly. A thorough backup can provide a way to get back in business quickly, but another reason to have robust backups is for when cybercriminals threaten to release sensitive customer data. Attackers will often freeze or steal sensitive data with the threat of releasing it unless a ransom is paid. But beware: these cyber crooks will often release sensitive data, including customer information like Social Security numbers, unless the ransom is paid. So, the more safeguards you can place around such data, the better.
  2. Build and maintain strong cybersecurity systems. This can include third-party cybersecurity software as well as in-house cyber risk protocols and methods.
  3. Train and constantly update all personnel on the importance of cybersecurity so the staff is on constant alert for bad actors trying break in and are familiar with company protocol for cybersecurity. 
  4. Strengthen credential security by adding protections like strong passwords, passphrases, and two-step verification.
  5. Buy cyber insurance to help cover costs from attacks. Look for a policy that includes coverage for ransomware that pays for lawyers, consultants, negotiators, and ransom payments.
Ransomware is a growing threat to CFIs and other financial institutions. To better cope, CFIs should strengthen cybersecurity defenses, regularly educate staff, and develop plans for dealing with such attacks and recovering from them. 
Subscribe to the BID Daily Newsletter to have it delivered by email daily.

Related Articles:

1234, This Password’s Not Safe Anymore (If It Ever Was)
Is your password too easy to guess? We discuss recent findings about the most common passwords and provide tips on creating more complex passwords that you can still remember.
How to Make Life Miserable for Ransomware Attackers
CFIs are among many financial services companies that have been hit by ransomware attacks, and the financial services sector is among those most likely to pay the ransom. To fight back, CFIs need to create a hostile environment for cyber attackers.