Govt sector suffers high ransomware attack encryption rates


Tuesday, 04 October, 2022

Govt sector suffers high ransomware attack encryption rates

Sophos has published a new sectoral survey report, ‘The State of Ransomware in State and Local Government 2022’, which found that 72% of state and local government organisations attacked by ransomware had their data encrypted — 7% more than the cross-sector average.

Only 20% of state and local government organisations were able to stop the ransomware attack before data could be encrypted — significantly less than the cross-sector average of 31% (8% had their data held for ransom but not encrypted). However, the government sector had one of the lowest attack rates, with only 58% hit by ransomware in 2021.

“Traditionally, government organisations haven’t been prime targets for ransomware attackers, since they don’t have as much money as traditional businesses, and criminal groups are reticent to attract attention from law enforcement. However, when these organisations do get hit, they have little in the way of protection because they don’t have the budget for additional, in-depth cybersecurity support, including threat-hunting teams or security operations centres,” said Chester Wisniewski, a principal research scientist at Sophos.

“There are a couple of reasons for this. One is that, while they collect a large amount of sensitive information, they need to keep this information easily accessible. Second, they need to spend the majority of their budget on their actual municipality. Taxpayers can see if the streets are clean or if their schools are reaching their education goals. They can’t ‘see’ a cyber attack or understand why a managed detection and response (MDR) provider might be necessary to defeat ransomware,” he said.

In addition to experiencing a high encryption rate, the government sector also experienced a significant drop in the amount of encrypted data recovered after paying the ransom when compared to 2020 — 58% in 2021 versus 70% in 2020; this was also lower than the cross-sector average of 61%.

Additional findings include:

  • 2021 saw a 70% rise in the number of ransomware attacks against local government organisations; 58% were targeted when compared to 34% in 2020.
  • The cost for government organisations to remediate an attack was three times the average ransom the sector paid.
     

In the light of the survey findings, Sophos experts recommend the following best practices for all organisations across all sectors:

  • Install and maintain high-quality defences across all points in the environment. Review security controls regularly and make sure they continue to meet the organisation’s needs.
  • Proactively hunt for threats to identify and stop adversaries before they can execute attacks — if the team lacks the time or skills to do this in-house, outsource to an MDR team.
  • Harden the IT environment by searching for and closing key security gaps: unpatched devices, unprotected machines and open RDP ports, for example. Extended detection and response (XDR) solutions are ideal for this purpose.
  • Prepare for the worst, and have an updated plan in place of a worst-case incident scenario.
  • Make backups, and practise restoring them to minimise disruption and recovery time.
     

The State of Ransomware in State and Local Government 2022 survey polled 5600 IT professionals in mid-sized organisations across 31 countries, including 199 respondents from the state and local government sector. Download the full report here.

Image credit: iStock.com/LuckyStep48

Related News

LockBit named nastiest malware of 2024

LockBit, a ransomware malware known to have been used to attack Australian targets, has been...

Proofpoint email security tools pass IRAP assessment

Following on from its launch of Australian data centres last year, Proofpoint has completed an...

Government introduces landmark cybersecurity legislation

The Australian Government has introduced legislation to create Australia's first standalone...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd