The WannaCry Attack: A Wake-up Call for Organizational Information Governance?
The sort of ransomware attack experts have warned about for years has happened. Now organizations need to examine their security postures.
May 17, 2017 at 03:18 PM
7 minute read
NHS website affected by international computer cyber attack Ransomware cyber attack, London, May 13, 2017 (Rex Features via AP Images) |
On May 12, the sort of cyber disaster security experts had warned about for years had finally happened, in its wake compromising everything from corporations to hospitals across the planet. But something else that had never happened started then, too—everyone paid attention. Considering the “numerosity and intensity and geographic spread of the attacks,” Day Pitney partner Jed Davis said, “this is the wake-up call, if people needed one before now.”
And that wake-up call, Davis added, needs to be heard on two fronts: “the need to take control of the overall risk management process, including backing up the crown jewels,” and improving security awareness.
But as with any cyber incident, what remains to be seen is whether organizations will see beyond usual platitudes and heed the advice of cybersecurity and information governance experts. When it comes to basic cybersecurity hygiene, “you can say it a hundred times, but that doesn't mean people listen to you,” said Alan Brill, senior managing director at Kroll Advisory Solutions. “If this is not a good wake-up call to tell you to [follow security protocol], I honestly don't know what is.”
While many experts believe the worst of the WannaCry ransomware attacks are over, the malware is likely to continue spreading through computers. And while this particular strain of malware can be halted by a Microsoft upgrade, ransomware has and will continue to cause headaches for companies that many deem unnecessary. So what can organizations do to better secure themselves against such attacks in the future?
|Cybersecurity as an Inevitable Component of Information Governance
The attack has been successful because it exploits a vulnerability in Windows, which is the most-used operating system on the planet among desktop and laptop computers. WannaCry served as “proof of concept” of how these types of attacks “can scale exponentially,” said Ed McAndrew, cybercrimes prosecutor and data security lawyer at Ballard Spahr. Thus, it can be a sign of the sorts of attacks we're likely to see in the future.
“A lot of ransomware attacks, in the early days, were attacks targeting individual end users. What we're seeing now is system-wide ransomware attacks, server-side ransomware attacks, and they have the ability to cripple entire organizations. So I think every organization should be asking itself whether it's ready for a system-wide ransomware attack,” he said.
A method for preparation is an incident response plan, i.e. a company's approach to managing the aftermath of a cybersecurity incident. McAndrew said this should include having game plans for particular scenarios and training employees and incident responders to spot emails and “the types of attack vectors” that introduce malware to computers (e.g., hyperlinks and attachments).
|Prepping for Next Time
On the technical side, McAndrew noted the importance of having controls in place that limit ransomware introduction and spreading, such as the “up-to-date patching of systems” like Microsoft's step to limit WannaCry, as well as a system that utilizes sandboxing—a security practice of separating a program from others for test running—“for anything attached to an email before it makes it to the network.” He also suggested having a plan in place that allows organizations to “pull the plug” on an organization's computers while having information remain easy to recover so the organization “can get back to business as usual.”
Doing this requires backing up data, a step typically counted in basic cybersecurity hygiene but often overlooked. It “makes the consequence of being locked out of your data much more tolerable if you have a backed up copy,” said Rob Silvers, partner in Paul Hastings' cybersecurity practice.
In addition to backing up data, there's a growing movement for organizations to include “defensible deletion” as part of their information governance plans, a strategy defined by Driven Inc.'s Philip Favro as “a comprehensive approach that companies implement to reduce the storage costs and legal risks associated with the retention of electronically stored information (ESI).”
“Information governance is all about getting a handle on where all this data is to begin with and why it's being kept in the first place, especially given that data is exponentially increasing all the time,” said Jason R. Baron, of counsel at Drinker Biddle & Reath. “But do companies have a handle on where their data is and what could be vulnerable?”
To this end, Baron advised “putting good policies in place” alongside technologies that “help increase the efficiency of the company. With good protocols in place, companies can minimize the risk of harm due to phishing attacks.”
But because ransomware can “take over” a computer until a ransom is met, companies should also consider whether to pay the ransom, and if so, how much they are willing to pay. Perhaps more important is securing the type of currency demanded, given that hackers often choose bitcoin—a currency that doesn't require a third party for processing and can be immediately transferred. In addition to knowing the exchange rate, organizations should know where they could obtain bitcoins, given that there's a finite amount of them.
“Have you asked everyone at the organization that needs to be asked, under what circumstances would you pay the ransom?” McAndrew said. “Because you won't be able to at the last [moment].”
|Where Everyone Missed the Mark, and Why It Matters
As with many cyber incidents, many organizations were vulnerable to WannaCry simply because they failed to do what Kroll's Brill calls “basic housekeeping.” In the case of preventing something like WannaCry, organizations can save much time and effort “making sure patches get installed unless there's a very specific reason not to do so.”
“You've got to have a laser focus on getting those patches in place, getting your immunization level up to where it should be,” he added.
Indeed, incident response team lead and senior director with Kroll Cyber Security Devon Ackerman said, “If everybody played by the patching rule book, [WannaCry] certainly wouldn't have spread as much.” But Ackerman also noted that companies are likely to see “some revisions or variants of this malware” over the next week or two, noting that at present, there have been about two incidents of newer versions of the malware “in the wild.”
Researchers of such incidents “have found variants where the [malware] code is slightly modified,” he said. This modification has made the malware essentially immune to a current approach to detecting the malware and shutting down the infected network. Thus, Ackerman added, “it just spreads.”
Nevertheless, basic cybersecurity hygiene, such as downloading security updates such as those offered by Microsoft to “patch” previous software vulnerabilities, is increasingly essential to companies, as in some instances clients can hold them responsible for compromised information. This may be particularly true for the WannaCry breach, as Microsoft found its security flaw this past March and, in the same month, issued a security patch that many failed to update.
“This security patch was available in March and was labeled at the time critical by Microsoft,” said Paul Hastings' Silvers, who was previously assistant secretary for cyber policy at the Department of Homeland Security. “So companies that don't install that kind of patch and then find themselves in a situation where they're locked out, and that causes harm to others, may find themselves being sued for negligence.”
Further, when organizations are blocked from accessing their data, this “compromises ongoing business operations, and has a cascading domino effect throughout an organization in terms of its obligations and potential liabilities to other organizations [and] to customers,” McAndrew said. Thus, it could “impact their ability to comply with regulations in place.”
“There are measures that companies simply have to take to protect themselves and their shareholders and their businesses,” Silvers added. “And this weekend the attacks served as a reminder of that.”
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250