[BreachExchange] Cyber-attack! Would your firm handle it better than this?

Destry Winant destry at riskbasedsecurity.com
Fri Aug 10 09:30:40 EDT 2018


https://www.bbc.co.uk/news/technology-44482380

What's it like being the victim of a live cyber-attack? What should
you do to protect your company from further damage? And should you pay
that ransom demand? Technology of Business eavesdropped on a "war
games" exercise hosted by cyber security firm Forcepoint that was
based on lots of real-life experiences.

Scenario

IT staff at fictional High Street optician Blink Wink's head office
have been suckered by a phishing email. Someone clicked on a link to a
spoof website because they thought the email looked legitimate. It
wasn't. That was two months ago. Today, the proverbial hits the fan...

Tuesday 08:30

Tony Lewis, Blink Wink's IT administrator, starts his day clearing out
the company's public email inbox of the usual junk and spam. One
message stands out. His stomach lurches.

"I have more where this came from. We will be in touch shortly with
our demands," the text says below someone's name, credit card details
and email address.

Tony hopes it's a hoax, but can't take the risk. He swallows hard and
calls the firm's security officer, Doug Hughes. Doug isn't impressed
as he's on holiday in New York where it's 3:30am.

"This better be good," he growls. Tony forwards the suspect email.

"Have we validated the credit card number?" Doug asks, tension evident
in his voice now. "Is it one of our customers?"

"I don't know yet," admits Tony.

"Well, when did we get this?" Doug snaps.

"Um... well... it seems we got it yesterday just after I'd left work,
so I didn't notice it until this morning."

"So we're at least 12 hours into this?"

"Um, yeah," Tony mumbles sheepishly.

Tuesday 13:30

"We've got a second email," Tony tells Doug. "It's a ransom demand for
£15,000 in the Litecoin crypto-currency. We have to pay by 22:00 BST
or they'll delete all our customer records."

"What?" shouts Doug. "I thought they only had one?"

"Um, no. They claim to have them all."

In a sweat, Doug calls Blink Wink's legal counsel Grace Bolton for
advice. She has to dial in several times as her headset is
malfunctioning. Her voice keeps cutting out during the conversation.

"This is obviously a potential breach," she says. "So do not respond
to that message. I'll need to review existing legislation so we know
where we stand."

"What about the police?" asks Doug, his romantic city break now
thoroughly ruined. "And the Information Commissioner? What about GDPR,
who do we notify?"

Tuesday 15:30

Things are spiralling out of control for Blink Wink. The hackers have
posted a tranche of customer names and credit card numbers on
Pastebin, a public website for sharing text and source code.

Doug has now confirmed that the data is genuine.

"Shouldn't we shut down the website?" asks Tony. "Then we'll limit the risk."

Grace butts in. "Before we do that, who do we need to tell first?
What's our data breach policy?"

"I thought that came from legal," says Doug.

"Aren't you the data protection officer?" Grace asks Tony.

"Nope, not me..."

"God, is it me?" asks Doug despairingly. "Anyway, if we pull the
website that'll just draw attention to ourselves won't it? Not sure
that's the right thing to do."

"Me neither," says Grace.

Blink Wink's head of public relations, Sandra Ellis, has been looped
in to the conversation.

"This isn't looking good," she says rather obviously. "We've failed to
protect our customers' private data. We could get really hammered for
this."

She points out that the firm has a "buy one get one free" contact lens
promotion running at the moment.

"We're driving people to the website right now. Are their details
being stolen too?"

"Very possibly," says Doug. "We've got to shut down the site - or
parts of it anyway. And then we've got to decide whether to pay the
ransom."

Tuesday 17:00

Sandra Ellis has drafted a public statement but doesn't propose
releasing it to the media until people start asking questions.

"We'll just say we are experiencing an incident and do it reactively," she says.

"Not an incident - a breach," Doug advises.

"No, don't use the word 'breach' - not yet anyway," chips in Grace,
thinking of the legal ramifications. Tony bursts in on the conference
call.

"We've found some malware! We saw an email come in that went to
quarantine so we checked it out and it had an attachment. That could
be it."

"You didn't click on it did you?" asks Doug, his day going from bad to worse.

"Um... I just thought it would speed things up..."

Doug swears and dips out of the call to get his security staff to
check for any more damage.

Grace turns the conversation to informing the Information Commissioner's Office.

"We can phone or report it online," she tells them. "But we need to
say what we did to mitigate the problem."

"Well, we were meant to get the latest threat detection software last
year, but the guy who was looking into that left and wasn't replaced,"
says Tony. "It kinda didn't happen."

"Well don't tell the ICO that," Grace barks. "If we can't show we had
adequate controls in place we could be in trouble. And the
cyber-insurance people might not pay out either."

Later, Doug confirms that the latest phishing email was a red herring,
but informs the team: "They did find a phishing email sent two months
ago that linked to a log-in page made to look like the one for our
cloud provider. That's how they got in.

"We've got to handle things better from now on," Doug concludes. "This
will happen again, and it's only going to get worse."

So what should Blink Wink have done?

Richard Ford, chief scientist at Forcepoint, says: "Reacting late has
put Blink Wink on the back foot. You need to move quickly in these
situations otherwise the attackers dictate the pace.

"A poor knowledge of data breach laws has made the company vulnerable.
They clearly didn't have a breach policy in place nor did they know
who was responsible for each role or what they should be doing."

Richard says the firm should have:

- prepared a data breach plan with step-by-step actions to take
- rehearsed this plan with staff
- designated who is responsible for what during a breach
- regularly circulated and updated the plan so senior staff were
familiar with it
- notified third-parties and suppliers
- gathered evidence for the Information Commissioner to show how it
has handled the issue
- called its cyber-insurance provider for advice and help
- prepared a statement for customers demonstrating how it would help -
deal with any damage
- refused to pay the ransom - there's no guarantee they'd get their data back.

And if your firm is the victim of a data breach, cyber expert Troy
Hunt says it should:

- identify where the demand/ransomware came from
- contain infected devices (get them offline)
- assess how many machines have been affected
- restore lost data from back-ups
- tell customers if their data has been compromised
- plan to make sure this doesn't happen again.


More information about the BreachExchange mailing list