BID® Daily Newsletter
Jun 17, 2021

BID® Daily Newsletter

Jun 17, 2021

Ransomware Attacks On Community Banks

Summary: Infamous cybercriminals caused the Colonial Pipeline breach and also hacked into three community banks within the same timeframe. Seven tips can help protect your institution, including: educating employees, limiting network exposure, backing up data, automatically updating devices, contacting the FBI if attacked, reminding customers regularly, and keeping resources handy.

Did you know that Henri Matisse’s painting, “Le Bateau”, was hung upside down in the MoMA for a period of time? It wasn’t until a stockbroker who was quite familiar with the painting noticed this and rectified the error. That said, recent events have proven that community financial institutions (CFIs) are not too small to go unnoticed by cyber thieves.
DarkSide and Ragnar Locker are two cybercriminal groups known for hacking into systems, stealing sensitive information, and then demanding a ransom or else posting all of the information. Last month, they posted evidence of a hack into Colonial Pipeline on their sites and then they did the same to three community banks.
In the case of these banks, the evidence posted included screenshots of the banks’ customer databases. The hackers demanded that the banks ante up, in order to stop them from exposing the customer information. These incidents are shocking reminders that financial institutions of all sizes are fair game to these criminals.
While ransomware attacks are not new, the pandemic shutdowns and remote work arrangements have made all financial institutions (FIs) more vulnerable to these types of attacks. Indeed, the industry experienced a 520% surge in phishing and ransomware attacks between March and June 2020, according to a report by security company Arctic Wolf.
In response to this increase and recent attacks, the federal government has stepped up its role in cybersecurity too. It issued an executive order in May providing for more sharing of threat information, modernizing federal government cybersecurity, and standardizing the federal government’s response to cybersecurity incidents, among other actions. 
Similarly, with current events on top of mind, law enforcement officials and cybersecurity organizations are reminding FIs what they can do to stay ahead of ransomware attacks. 
  1. Educate employees. Staff should be regularly updated on the latest threats, including warning signs and safe practices to help prevent ransomware from infiltrating the institution’s system.
     
  2. Limit network exposure. Only authorized users should be able to install and run software applications on network devices. Also, be sure to implement network segmentation best practices.
  3. Back up data. Ransomware attacks prevent institutions from accessing the stolen data. So, a best practice is to store a backup of the data on a separate device or offline that can be accessed, if such an attack were to occur.
  4. Automatically update all devices used by staff. Antivirus and anti-malware solutions should be kept up-to-date. Institutions should conduct routine scans to make sure these solutions are doing their jobs.
  5. Contact the FBI if attacked. You can find the FBI office nearest you on the FBI field offices page. 

  6. Remind customers regularly. Don’t assume that all customers are well versed in cyber risk. CFIs should regularly update their customers on the ways to stay safe. A few reminders include:
  • Tell customers to not open emails or attachments they don’t recognize
  • Keep an offline backup of personal information
  • Maintain the latest security software, web browser, and operating system and turn on automatic updates.
  • Enable popup blockers

7. Keep helpful resources handy. The below resources are good ones to review on a regular basis to help prepare for cyber threats from ransomware attacks. 
Ransomware can wreak great havoc, so it is imperative to stay on top of cyber threats. This is not a one-and-done process. Continuous monitoring of threats, educating of employees and customers, and safeguarding of systems are necessary to combat these cyber thieves and stay safe.
Subscribe to the BID Daily Newsletter to have it delivered by email daily.

Related Articles:

Educating Customers on the Risks of Gaming Platforms
Online gaming platforms have become extremely popular in recent years, with 76% of children under 18 playing regularly and connecting their parents’ credit cards and bank cards to their gaming accounts. Financial education about the risks of online gaming payments can add value for young and older customers alike.
Spoofers Target CFI Customers
A June 2022 report from Allure Security, a cybersecurity firm that specializes in protecting financial institutions, says that about 20% of CFI’s are the targets of website impersonation attacks. Rather than simply assume that website impersonation attacks are something that happens to larger banks, CFIs should be proactive about protecting themselves and their customers from this kind of fraud. We explore a few tactics to keep your CFI and your customers safe.