Canadian energy, health, manufacturing sectors were major targets of ransomware attacks: cyber spy agency - Action News
Home WebMail Monday, November 11, 2024, 04:05 AM | Calgary | -1.3°C | Regions Advertise Login | Our platform is in maintenance mode. Some URLs may not be available. |
Politics

Canadian energy, health, manufacturing sectors were major targets of ransomware attacks: cyber spy agency

More than half of the known ransomware victims in Canada this year were critical infrastructure providers, according to a new threat assessment from Canadas cyber spies, and the number is likely even higher.

2021 ransomware trend report released by Communications Security Establishment, a cyber intelligence agency

A health-care worker transports a patient in the dialysis unit at Toronto's Humber River Hospital. The hospital was the target of a ransomware attack this June. The Communications Security Establishment (CSE), a Canadian cyber spy agency, warns attacks like it will likely continue. (Nathan Denette/The Canadian Press)

More than half of the known ransomware victims in Canada this year were critical infrastructure providers, according to a new threat assessment from Canada's cyber spies and the number is likely even higher.

As part ofa new awareness campaign, the Communications Security Establishment (CSE), Canada's foreign signals intelligence agency, released a ransomware bulletin Monday looking at the key trends of ransomware in 2021.

In its report, CSE's Cyber Centre said ransomware attacks are "brazen, sophisticated, increasing in frequency, and, for the cybercriminals, very profitable.

"The impact of ransomware can be devastating, and the severity of the financial consequences related to a ransomware attack can be profound."

For the first time, the agency also confirmed publicly Monday that it hasused its new cyber attack powers, granted to it through legislation back in 2019.

"The Communications Security Establishment Act gives CSE the legal authority to conduct cyber operations to disrupt foreign-based threats to Canada, including cybercriminals," said CSEspokespersonEvan Koronewski.

"Although we cannot comment on our use of foreign cyber operations (active and defensive cyber operations) or provide operational statistics, we can confirm we have the tools we need to impose a cost on the people behind these kinds of incidents.

"We can also confirm we are using these tools for such purposes, and working together with Canadian law enforcement where appropriate against cybercrime."

Ransomware is a form of malware used by threat actors and criminals who encrypt files on a devicethendemand a ransom in exchange for decryption. Once successfully hacked, ransomware victims are often attacked multiple times.

CSE said it's aware of235 ransomware incidents against Canadian victims from Jan. 1 to Nov. 16 of this year and more than half of those targets were critical infrastructure providers, including those in the energy, healthand manufacturing sectors.

The number is likely higher, as the agency said most ransomware events go unreported.

"The COVID-19 pandemic has made organizations like hospitals, governmentsand universities more mindful of the risks tied to losing access to their networks and often feeling resigned to pay ransoms," notes the report.

"Cybercriminals have taken advantage of this situation by significantly increasing the value of their ransom demands."

Canadian hospitals hit

Newfoundland and Labrador is still reeling after a cyber attack hit its health-care system, cancelling thousands of medical procedures ranging from chemotherapy to X-rays.

Sources have told CBC the security breach is a ransomware attack, but so far government officials have not confirmed the nature of the cyberattack and will not sayif they have received a ransom demand.

This summer Humber River Hospital in the Toronto areawas forced to shut down its IT systems in order to prevent a ransomware attack.

A customer pumps gas at Costco, as others wait in line, on Tuesday, May 11, 2021, in Charlotte, N.C. Gasoline futures are ticking higher following a cyberextortion attempt on the Colonial Pipeline, a vital U.S. pipeline that carries fuel from the Gulf Coast to the Northeast. (AP Photo/Chris Carlson)
A customer pumps gas at Costco as others wait in line on May 11, 2021, in Charlotte, N.C. Earlier this year the Colonial Pipeline, the largest fuel pipeline in the U.S., was hit by a cyber attack attributed to the Russia-based DarkSide RaaS cybercriminal group. (Chris Carlson/The Associated Press)

Staff were unable to access electronic patient records and diagnostic test results leading to long waits in the emergency department and prompting the hospital to cancel clinics and redirect some ambulances to other hospitals.

CSE said it expects high-impact targeting to continue.

"We assess that ransomware operators will almost certainly continue to target large organizations with operational technology (OT) assets, including organizations in Canada, to try to extract ransom, steal intellectual property and proprietary business information, and obtain personal data about customers," it warned.

Canada is far from alone. This year has been marred by the highest ransoms and the biggest payouts around the world.

Earlier this year the Colonial Pipeline, the largest fuel pipeline in the U.S., was hit by an attack attributed to the Russia-based DarkSide RaaS cybercriminal group.

As a result, the company's operations were affected, resulting in record price increases, panic-buying, and gasoline shortages

Ransomware operators will likely become increasingly aggressive: CSE

In Canada, CSE said the estimated average cost of a data breach, which includes but is not limited to ransomware, is more than $6 million. The average price has stabilized over the past years, a trend CSE attributes to cybercriminals becoming better at tailoring their demands to what their victims are most likely to pay.

Ransomware operators will likely become increasingly aggressive in their targeting in 2022, including against critical infrastructure, warned the agency.

Part of the problem fighting ransomware is that many operators and their affiliates are based in countries with lax or non-existent laws against cybercrime, said CSE.

A person types on a computer keyboard.
Ransomware operators will likely become increasingly aggressive in their targeting in 2022, including against critical infrastructure, warns CSE. (PabloLagarto/Shutterstock)

"Mitigating the increasing risks will require concerted national efforts to improve cyber security and adopt best practices to harden critical systems, as well as co-ordinated international actions to undermine criminal infrastructure and tactics," said the report.

As part of that effort, CSE, working with the RCMP, has published what they call a "playbook" that outlines steps organizations and businesses can take to protect against ransomware, and what to do if attacked.

Organizations urged to implementcyber safety measures

A handful of cabinet ministers have signed an open letter to Canadian organizations urging them to implement basic cyber security measures.

The letter, co-signed by Defence Minister Anita Anand, Emergency Preparedness Minister Bill Blair, Public Safety Minister Marco Mendicino and International Trade Minister Mary Ng, said the federal government is working with its allies to pursue cyber threat actors and disrupt their capabilities.

"We are also assisting in the recovery of organizations compromised by ransomware and helping them to be more resilient going forward," they wrote.

"Our message is clear: taking basic steps to ensure your organization's cyber security will pay swift dividends."

Add some good to your morning and evening.

Your weekly guide to what you need to know about federal politics and the minority Liberal government. Get the latest news and sharp analysis delivered to your inbox every Sunday morning.

...

The next issue of Minority Report will soon be in your inbox.

Discover all CBC newsletters in theSubscription Centre.opens new window

This site is protected by reCAPTCHA and the Google Privacy Policy and Google Terms of Service apply.