infoguard-cyber-security-advent-story

Advent, Advent, the school is “burning”! [Part 3]

In the second part of our cyber Advent story   we found out that attackers make mistakes too. Sometimes they select and encrypt targets that don’t really have much money to spend. In the third and final part of our story, you will learn how the ransomware attack played out.

At Winterstadt School, we discovered that the initial attacks were already taking place back in the spring, and they continued over the summer. We suspected that various threat actors were prowling around on the systems (activities like port scans, lateral movement, installation of remote access solutions like AnyDesk, etc.). Most of the cyber criminals seem to have realised that this was a state school and therefore left it alone. Why then go to all that trouble when there are more lucrative targets? Presumably, this access was then sold on to someone else on the Darknet, so that at least the work they had done would make some kind of profit. This is where our attackers came in. They had done their research badly and assumed that they could demand a ransom, and encrypted the systems.

Cyber criminals also value their reputations

Back to the status quo. In the meantime, the attackers had grasped that there was probably not much money to be made here.  Once again, this revealed that the majority of ransomware attacks are not targeted, they are pretty opportunistic – wherever they can get in, they encrypt. This is a very important point in what is called “threat modelling”. This process involves a company validating and constructing its security system based on the likelihood of an attack by a certain grouping. I frequently hear statements like: “We have to protect ourselves against Nation State or against targeted industrial espionage.” However, the most likely form of attack for most companies remains opportunistic ransomware attacks. The probability of this occurring is very high, causing maximum damage.

So for us, most of the investigation was already over and done with; it was not even an option to pay the ransom. This is always the point where we structure the negotiations in such a way that we always maintain an exit strategy, while negotiating more aggressively over the price or even daring to pull a stunt. “LockBit” perceives itself as a serious business with a very strong reputation. If I wanted to “sign up” as a LockBit affiliate, I would have to fulfil various requirements. For example, I have to advance a sum of money corresponding to one Bitcoin (currently around 15,000 Swiss francs), and I have to be known or recommended in hacker forums. In addition, there are the so-called “Affiliate Rules” that you need to adhere to:

 

infoguard-x-mas-adventssory-22-t3_0

 

To put pressure on the attackers, we used the fact that educational institutions are only allowed to be encrypted if they are not state schools and they generate revenue.

 

infoguard-x-mas-adventssory-22-t3_1

 

In the end, I don’t know for sure what the crucial turning point was, whether it was the fear of having broken the rules, or simply the realisation that all the work was not worth it, but the reaction was immediate (see time stamp):

 

infoguard-x-mas-adventssory-22-t3_2

The decrypter we received afterwards definitely worked, and the teachers’ missing home drives could also be recovered, and most importantly, no data was published. 

Who knows, perhaps the attackers remembered that there was such a thing as morals and ethics after all when they released the data. In any case, the hopeful romantic in me would really love to believe that...
In this spirit, my team and all my InfoGuard colleagues and I would like to wish you and your nearest and dearest a festive and “safe” Christmas time! 

Don’t miss out on the cyber Advent competition!

But hold on – before we say goodbye, here’s a quick reminder about our cyber Advent competition. You don’t want to miss out on the chance to win great prizes? You still have the opportunity to participate until 30 December!

Cyber Advent Competition

 

<< >>

Cyber Security , Cyber Risks

Stefan Rothenbühler
About the author / Stefan Rothenbühler

InfoGuard AG - Stefan Rothenbühler, Principal Cyber Security Analyst

More articles from Stefan Rothenbühler


Related articles
Advent, Advent, the school is “burning”! [Part 2]
Advent, Advent, the school is “burning”! [Part 2]

In the first part of our three-part Advent story, we found out that Winterstadt school had fallen victim to a [...]
Advent, Advent, the school is “burning”! [Part 1]
Advent, Advent, the school is “burning”! [Part 1]

Dear readers, just like every year during Advent, we – by which I mean InfoGuard as a reliable cyber security [...]
Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 1]
Father Christmas gets in quietly, bringing lots of presents with him – but they’re not always the ones you want [Part 1]

The year is slowly drawing to a close and the festive season is right around the corner. It’s time to look [...]

Exciting articles, the latest news and tips & tricks from our experts on all aspects of Cyber Security & Defence.

Blog update subscription
Social Media
infoguard-cyber-security-guide-2