How to stay safe during the pandemic spike in cyberattacks - Action News
Home WebMail Tuesday, November 26, 2024, 08:51 AM | Calgary | -16.5°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
Ottawa

How to stay safe during the pandemic spike in cyberattacks

From hospitals to transit networks to municipal governments, the Ottawa area has been no stranger to cyberattacks during the pandemic. Here's what two cybersecurity experts have to say about the rise of cybercrime and what they think people should do to keep their data secure.

Hospitals, transit networks, municipal governments among recent victims

Why hospitals are a common target for cyberattacks

3 years ago
Duration 1:28
Raheel Qureshi, with iSecurity Consulting, says the complexity of hospital networks and the important nature of the patient information involved may lead administrators to pay the ransom demanded by cybercriminals.

The hospital in Kemptville.The transit network in Gatineau. The municipal government in Clarence-Rockland.

Those are just a few of the Ottawa-area organizations victimized in recent weeksbycybercriminals, emboldened asthe COVID-19 pandemic forces people to work from home and more and more business gets conducted online.

The health-care sectorin particularhas provena juicy target: just this month, the Rideau Valley Health Centre alsoexperienced a "cybersecurity incident" that took down itsIT network.

And it's not just happeninglocally, with criminalscarrying out a devastating attack onNewfoundland and Labrador's health-care network, stealing personal information connected to both employees and patients.

So how bad is the situation? Why is the pandemic exacerbating things? Andwhat can organizations do to protect themselves? We put those sorts of questions to a pair of experts in the cybersecurity field, and here's what they had to say.

What kind of attacks are organizations facing?

Two of the most common attacks are phishing scams and the surreptitious installation of ransomware, according to Det. Sgt. Vern Crowley with the Ontario Provincial Police's Cybercrime Investigation Team.

Phishing attacks generally involve someone, somewhere, trying to lure people into providing personal information like passwords or banking information.

Just this week, an Ottawa man was one of three people arrested in connection with anallegedphishing scam that breached the province's COVID-19 immunization system.

Ransomware, on the other hand, is malicious software that once it's beeninstalled encrypts data, forcing users to pay a ransom, usually in the hundreds of thousands of dollars, in exchange for the tools to regain access.

The Kemptville District Hospital temporarily shut down its emergency department in October after falling victim to a cyberattack. (Francis Ferland/CBC)

Have they really become more common during the pandemic?

The broad consensus appears to be that yes, the COVID-19 pandemic is contributing to a rise in cybercrime.

The Canadian Centre for Cyber Security (CCCS) has said crimesare being reported more frequently, especially lucrative ransomware attacks on the country'sfront-line health-care and medical research facilities.

Federal government employees working from home on virtual private networks (VPNs)were also warned in the early days of the pandemic to be on alert for phishing attacks.

Crowley said his team has "absolutely" seen attacksclimb during COVID-19,as many organizations payransoms to get their data back and cybercriminals realize they can make a quick buck.

"A lot of criminals are just moving to the online world," he said. "It's been going on across the board. Every sectorwe see getting hit."

Why is health care such an appealingtarget?

According toiSecurityConsulting'sRaheel Qureshi, whose firm works with dozens of Canadian hospitals and other health-care organizations,there are two big reasons.

The sector's highly integrated nature, with hospitals and clinics sharing patient records and exam results back and forth, means criminals canexploit weaknesses and encrypt data without anyone noticing, Qureshi said.

"The more complex your ecosystem is, the more difficult it is for you to detect and manage and track, right? Not that it can't be done, [but] there's a lot of investments required," he said.

"They're not in the business of cybersecurity. They're in the business of providing patient care."

What's more,when IT networks in the health-care fieldgo offline, it can put people's lives at risk and ransomware attackers know that urgency gives them leverage.

"The health-care sector is paying when it needs to," Qureshi said."It's been a very lucrative business for these threat actors."

A graph from a late 2020 report by the Canadian Centre for Cyber Security shows ransomware payments have steadily gone up. Qureshi says the organizations he helps generally face demands from $500,000 to $1 million, although negotiations can bring the final ransom down to a few hundred thousand dollars. (Canadian Centre for Cyber Security)

So how can organizations stay safe?

The best thing many organizations can do, Qureshi says, is to get a firm like his to perform a simulated ransomware attack:a two-to-three-week exercise that will pinpoint their IT weaknesses and offer solutions to fix them.

Individuals should also be tested, perhaps with a fake phishing attack, so that they know how to spot signs of danger and respond correctly, he adds.

Crowley says it's a good idea for organizations to ensureall important data is backed up offline. Those that use VPNs shouldimplementmulti-factor authentication to gain access a password combined with, say, a one-time code sent via text message.

He says it's also important to keepon top of the latest cybercrimehacks and trends, whether that's through monitoring CCCS's alerts and advisoriesor checking for malicious websites through the non-profit Canadian Internet Registration Authority.

Ultimately, groups should always have a playbookto both prevent attacks and react if there's been a breach, Crowley said one that involves notifying police. Different police forces can then cooperate on investigations to track down the perpetrators across the country and around the world.

Raheel Qureshi, a partner and co-founder with iSecurity, says the highly integrated nature of the health-care sector makes it a particularly juicy target for cybercriminals. (Submitted by Raheel Qureshi)

If they're hit with ransomware, should they pay up?

It's a complicated question, and there's no easy answer.

Many perpetrators are "very professional in an unethical way," Qureshi says. Organizations that submit to the ransom demands generally get complete instructions for decrypting their files, around-the-clock service, and sometimes even text files explaining how to shore up their online defences.

Qureshi's theory is that"brilliant" hackers in developing countries may turn to cybercrimeonly because they lack the legitimate opportunitiesin places like North America or Europe, and don't bear any ill will to their targets.

"Deep down inside, they feel bad it's a hospital. But they don't feel bad, because at the end of the day, they think of it as a professional transaction," he said. "It's a different world."

Still, police would never condone paying a ransom, Crowley says after all, you can't trust criminals to do what they say they'll do, and it just encourages them to keep breaking the law. Buthealso understands why someone might decide it's best to just cough up the money to make the problem go away.

"Ifyou're in that level of jeopardy and have to do it, that's a business decision," Crowley said.

"All we say [from the] law enforcement sideis, please ensure that you preserve any digital evidence in relation to the financial transactions or communications, so that we can get these guys."