BID® Daily Newsletter
Jun 17, 2021

BID® Daily Newsletter

Jun 17, 2021

Ransomware Attacks On Community Banks

Summary: Infamous cybercriminals caused the Colonial Pipeline breach and also hacked into three community banks within the same timeframe. Seven tips can help protect your institution, including: educating employees, limiting network exposure, backing up data, automatically updating devices, contacting the FBI if attacked, reminding customers regularly, and keeping resources handy.

Did you know that Henri Matisse’s painting, “Le Bateau”, was hung upside down in the MoMA for a period of time? It wasn’t until a stockbroker who was quite familiar with the painting noticed this and rectified the error. That said, recent events have proven that community financial institutions (CFIs) are not too small to go unnoticed by cyber thieves.
DarkSide and Ragnar Locker are two cybercriminal groups known for hacking into systems, stealing sensitive information, and then demanding a ransom or else posting all of the information. Last month, they posted evidence of a hack into Colonial Pipeline on their sites and then they did the same to three community banks.
In the case of these banks, the evidence posted included screenshots of the banks’ customer databases. The hackers demanded that the banks ante up, in order to stop them from exposing the customer information. These incidents are shocking reminders that financial institutions of all sizes are fair game to these criminals.
While ransomware attacks are not new, the pandemic shutdowns and remote work arrangements have made all financial institutions (FIs) more vulnerable to these types of attacks. Indeed, the industry experienced a 520% surge in phishing and ransomware attacks between March and June 2020, according to a report by security company Arctic Wolf.
In response to this increase and recent attacks, the federal government has stepped up its role in cybersecurity too. It issued an executive order in May providing for more sharing of threat information, modernizing federal government cybersecurity, and standardizing the federal government’s response to cybersecurity incidents, among other actions. 
Similarly, with current events on top of mind, law enforcement officials and cybersecurity organizations are reminding FIs what they can do to stay ahead of ransomware attacks. 
  1. Educate employees. Staff should be regularly updated on the latest threats, including warning signs and safe practices to help prevent ransomware from infiltrating the institution’s system.
     
  2. Limit network exposure. Only authorized users should be able to install and run software applications on network devices. Also, be sure to implement network segmentation best practices.
  3. Back up data. Ransomware attacks prevent institutions from accessing the stolen data. So, a best practice is to store a backup of the data on a separate device or offline that can be accessed, if such an attack were to occur.
  4. Automatically update all devices used by staff. Antivirus and anti-malware solutions should be kept up-to-date. Institutions should conduct routine scans to make sure these solutions are doing their jobs.
  5. Contact the FBI if attacked. You can find the FBI office nearest you on the FBI field offices page. 

  6. Remind customers regularly. Don’t assume that all customers are well versed in cyber risk. CFIs should regularly update their customers on the ways to stay safe. A few reminders include:
  • Tell customers to not open emails or attachments they don’t recognize
  • Keep an offline backup of personal information
  • Maintain the latest security software, web browser, and operating system and turn on automatic updates.
  • Enable popup blockers

7. Keep helpful resources handy. The below resources are good ones to review on a regular basis to help prepare for cyber threats from ransomware attacks. 
Ransomware can wreak great havoc, so it is imperative to stay on top of cyber threats. This is not a one-and-done process. Continuous monitoring of threats, educating of employees and customers, and safeguarding of systems are necessary to combat these cyber thieves and stay safe.
Subscribe to the BID Daily Newsletter to have it delivered by email daily.

Related Articles:

2022 Review, Pt. 3 of 3: The Ever-Evolving Cybersecurity Space
The cybersecurity landscape is constantly shifting and evolving. In our third and final recap of 2022, we look back at some of the trending cybersecurity risks posed to CFIs during the year and highlight key technology advancements helping to combat cybercrime.
Patrolling the Digital Space Outside the Security Wall
Cyber criminals lurk in a murky digital netherworld just beyond a CFI’s security wall. Knowing how to monitor those cyber spaces can help protect against breaches. We discuss a few growing cyber threats as well as strategies to enhance your CFI’s digital protection to prevent potential attacks.