What We Learned Key Takeaways from the 2018 Ransomware Attack on - - PowerPoint PPT Presentation

what we learned
SMART_READER_LITE
LIVE PREVIEW

What We Learned Key Takeaways from the 2018 Ransomware Attack on - - PowerPoint PPT Presentation

What We Learned Key Takeaways from the 2018 Ransomware Attack on Colorado Department of Transportation February March 2018 Topics How It Happened What It Did Timeline How We Responded Business Response Cyber Incident


slide-1
SLIDE 1

What We Learned

Key Takeaways from the 2018 Ransomware Attack on Colorado Department of Transportation February – March 2018

slide-2
SLIDE 2

Topics

Ø How It Happened Ø What It Did Ø Timeline Ø How We Responded

§ Business Response § Cyber Incident Response § Emergency Response

Ø The Cyber Players Ø What We’d Do Differently Ø Key Takeaways

slide-3
SLIDE 3

Incident Handling Process

slide-4
SLIDE 4

Prepare

slide-5
SLIDE 5

How It Happened

CDOT brought a virtual server on to test a new business process Virtual server connected to the CDOT network

Nothing wrong with that, right? Nothing wrong with that, right?

Virtual server also connected the internet

U m m , n

  • t

h i n g w r

  • n

g w i t h t h a t , r i g h t ? ? ?

It was a test system , so it didn’t have standard security controls U h

  • h

It was established as domain administrator account

OH #$%&

Brute force attack began the day the server was brought online. Over 40,000 brute force password attempts were made. System was compromised within 48 hours

slide-6
SLIDE 6

Identify

slide-7
SLIDE 7

What It Did

Ø Equipment

§ 1274 laptops (39%) and 427 desktops (81%) § 339 servers § 158 databases § 154 software applications § All VoIP phones

Ø Consider:

§ How do you pay employees & contractors without the payroll software application? § How do you communicate with internal and external stakeholders without email/conference call? § What do you tell external contractors when you disconnect them from your network?

slide-8
SLIDE 8

Containment

slide-9
SLIDE 9

Timeline

slide-10
SLIDE 10

How We Responded

Ø Business Response

§ Continuity of Operations

  • Internal - employees
  • External – customers

§ Recovery Priorities

  • Operate Financial Systems
  • Protection of Traffic Control Systems
  • Back to Business

Ø Cyber Incident Response

§ Secure the State Network

  • Contain the attack
  • Secure the Colorado State Network

§ Recovery Priorities

  • Eradicate the malware
  • Secure CDOT
  • Rebuilt (Sustainment) CDOT networks

Ø Emergency Response

§ Understand the Problem Sets § Understand the Stakeholder interests § Develop common priorities § Create unity of effort § Referee

Blocks 3 & 4 of ICS 202 Incident Action Plan

slide-11
SLIDE 11

Eradicate

slide-12
SLIDE 12

The Cyber Players (as designed(ish))

Malware Team

  • Office of Information

Technology

  • Venders
  • National Guard
  • DHS Hunt & Incident

Response Team

Network Team

  • Office of Information

Technology

  • Venders
  • National Guard

Endpoint Team

  • Office of Information

Technology

  • Venders

State Chief Information Security Officer & Cyber Incident Response Team

Unified Coordination Group CDOT ICP Gov’s Office

slide-13
SLIDE 13
slide-14
SLIDE 14

FEMA

The Cyber Players (what really happened(ish)

State Chief Information Security Officer & Cyber Incident Response Team

CDOT Gov’s Office Unified Coordination Group Dept of Homeland Security CDO T ICP

Malware Team

  • Office of Information

Technology

  • Venders
  • National Guard
  • DHS Hunt & Incident

Response Team

Network Team

  • Office of Information

Technology

  • Venders
  • National Guard

Endpoint Team

  • Office of Information

Technology

  • Venders

Vender HQs & PMs

slide-15
SLIDE 15
slide-16
SLIDE 16

Recovery

slide-17
SLIDE 17

What We’d Do Differently

Ø Deploy Incident Command (Unified Command Group) sooner Ø Define lanes and organized by tasks sooner Ø Clarify lanes and roles with vendors sooner Ø Synchronize the operational rhythms sooner (CDOT, Cyber Response, UCG) Ø Stop chasing the bad guy sooner

slide-18
SLIDE 18

Key Takeaways

Ø Define your Cyber Incident Response Team

§ Exactly who does exactly what??

  • Network team
  • Malware team
  • Endpoint team

§ Rehearse (no really – rehearse…)

Ø Seriously address Cyber in your COOP

§ Wholestic approach - not just an IT problem § What’s at risk? What will you do? § CDOT Senior Executive “Our COOP was better suited for a meteor hit than a cyber attack”

Ø Do cyber response exercises that include Cyber Emergency Management and Business responses Ø Mitigate. You mitigate for other risks, so do it for this one

§ Secure backup = mitigation

Ø It’s an incident – act like it!

§ P.S. don’t freak out – it’s an incident, you've done this before

Ø Public Information Officers matter!

slide-19
SLIDE 19

Incident Handling Process

slide-20
SLIDE 20

Lesson Learned