The ripple effect of the Kaseya ransomware attack is still being felt. Leonardtown, in Southern Maryland is reportedly another victim of the massive attack. The town’s government computers were taken completely offline after the town’s IT management company, JustTech, informed them they were involved in the attack. JustTech is a client of Kaseya’s and uses products that had been affected by the hack. The REvil ransomware gang is responsible for the attack and has demanded $45,000 for each of Leonardtown’s affected computers. Leonardtown officials stated that all but two of the towns nineteen computers were affected. Binary Defense analysts have yet to see Leonardtown’s data posted on REvil’s leak site despite the town refusing to pay any ransom.
To protect against ransomware attacks, organizations should regularly back up data, air gap, and password protect backup copies offline. Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides. Implement network segmentation. Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud). Install updates/patch operating systems, software, and firmware as soon as practical after they are released. Implement monitoring of security events on employee workstations and servers, with a 24/7 Security Operations Center to detect threats and respond quickly. Use multifactor authentication where possible. Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes. Avoid reusing passwords for multiple accounts. Focus on cyber security awareness and training. Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.