Consider This from NPR - How The Biden Administration Is Confronting A Surge In Cyberattacks

Episode Date: June 7, 2021

Cyberattackers have recently targeted a crucial fuel pipeline, a global meat distributor and a water treatment plant. The Biden administration likens the surge in cyberattacks to terrorism — and say...s they plan to treat it like a national security threat. NPR National Security Correspondent Greg Myre details the administration's plans. When businesses are targeted by ransomware, someone like Bill Siegel steps in to help companies figure out if they have any options but to pay up. Siegel runs Coveware, a company that responds to ransomware attacks and often negotiates with hackers. He spoke to NPR's Rachel Martin. In participating regions, you'll also hear a local news segment that will help you make sense of what's going on in your community.Email us at considerthis@npr.org.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

Transcript
Discussion (0)
Starting point is 00:00:00 A month ago, a pipeline carrying roughly 45% of fuel supplies for the entire East Coast went offline. Pipeline cyber attack. A major source of our nation's fuel shut down by hackers demanding ransom. 5,500 miles of a pipeline run by Colonial Pipeline Company were shut down after hackers broke into the company's computer systems, encrypted certain data, and demanded a ransom to unlock them. That's what's known as a ransomware attack. Across the southeast and up the east coast, gas prices are going up and pumps are going dry. The pipeline's week-long shutdown led to panic buying, which caused widespread fuel shortages and temporary price hikes. And the hackers, well, they got what they wanted.
Starting point is 00:00:44 Of course, the initial thought is you don't want to pay the ransom. You don't want to encourage. You don't want to pay these contemptible criminals. Colonial Pipeline CEO Joe Blount told NPR his company agreed to pay hackers, believed to be Russian, a ransom of nearly $4.5 million to get its pipeline back online. When you know that you have 100 million gallons of gasoline and diesel fuels and jet fuels that are going to go across the southeastern and eastern seaboard of the United States, it's a very critical decision to make. And if owning that e-encryption tool gets you there quicker,
Starting point is 00:01:22 then it's the decision that had to be made. Consider this. Attacks like the Colonial Pipeline hack are on the rise, and now the U.S. government says it will start treating them like terrorism. From NPR, I'm Adi Cornish. It's Monday, June 7th. This message comes from NPR sponsor Hyundai. They questioned everything to create the all-new Hyundai Tucson, available as a hybrid and plug-in hybrid, which both switch from electric to gas without you even noticing. Learn more at Hyundai.com.
Starting point is 00:01:59 This message comes from NPR sponsor TalkDesk. TalkDesk offers a better way to do customer experience. With TalkDesk's innovative solution, you can get superior contact centers up and running fast. So if you're customer obsessed, visit TalkDesk.com. What happens to police officers who get caught stealing, lying, or tampering with evidence? Each week, we open up an internal affairs investigation that used to be secret to find out how well the police police themselves. Listen to On Our Watch, a podcast from NPR and KQED.
Starting point is 00:02:35 It's Consider This from NPR. The director of the FBI says this is a moment like 9-11 when the U.S. had to face a new reality about an existential threat. In a print interview this week with The Wall Street Journal, Christopher Wray said, quote, There's a shared responsibility, not just across government agencies, but across the private sector and even the average American. He wasn't just talking about the colonial pipeline hack. Right now, Wray told the Journal, the FBI is investigating around 100 different types of ransomware, many tracing back to hackers in Russia. We are learning more about the scale of the hack into Microsoft's Exchange server
Starting point is 00:03:15 email software. Hundreds of thousands of government offices, small businesses and schools could be affected. In recent months, Microsoft's email service was compromised and left the company scrambling to push out software fixes to customers. Another attack happened in Florida, where hackers targeted a water treatment plant using remote access to increase levels of dangerous chemicals in the water supply. City officials have disabled that remote access system that was used in the hack. There are several safeguards in place that would have prevented that contaminated water from ever entering the supply. And just last week.
Starting point is 00:03:48 Another U.S. company victimized by a cyber attack. JBS, the world's largest meat supplier, was targeted with ransomware. Here in the U.S. they've got processing facilities that do chicken, beef and pork. All of those facilities were shut down for a few days. And the FBI later said that it appeared a Russian-linked group of hackers was behind the attack. JBS plants are back up now, and it's unclear if the company paid any ransom to hackers. Ransomware is a difficult problem. Neuberger, the senior White House advisor in charge of the cyber response, acknowledged that some companies simply are not equipped to defend themselves from ransomware attacks. We discourage the payment of ransoms. And we also understand that sometimes companies
Starting point is 00:04:35 are in a difficult place if they don't have backups. I hope that each company, each government agency that looks at the number of incidents that have occurred, recognize the need for us to build secure and resilient digital infrastructure. And how will the Biden administration help companies do that? Well, that's the question our national security correspondent Greg Myrie has been looking into. President Biden received no grace period when it came to cyber. The cyber pressures that this administration has faced so far have been relentless. President Biden received no grace period when it came to cyber. The cyber pressures that this administration has faced so far have been relentless. April Falcon Doss is a former National Security Agency official who now heads a technology program at Georgetown's law school.
Starting point is 00:05:18 As the cyber breaches pile up, cyber experts say it's important to note the two distinct threats. Glenn Gerstel was a senior NSA official until last year. There clearly is a dividing line between cyber hacks for intelligence gathering purposes and these ransomware attacks that are designed principally for financial benefit. On one side of that line is the SolarWinds attack uncovered last December. This was intelligence gathering by Russian spies quietly stealing U.S. government secrets. On the other side is ransomware, which is surging. These require different responses, Gerstel says, but he's quick to add, both the intelligence attacks and some of the most significant ransomware attacks we have have one thing in common, and that's Russia. Biden says he'll raise the cyber issue with Russian
Starting point is 00:06:09 leader Vladimir Putin at a June 16 summit in Switzerland. Despite all the evidence, Putin denies Russian involvement in the intelligence hacks and shrugs his shoulders when asked about the ransomware attacks from criminals based in Russia. Gerstel says the U.S. shouldn't accept this answer. It's almost impossible to believe that a major criminal gang would operate inside of Russia and have real-world effects in the United States, and Putin wouldn't know about it. FBI Director Christopher Wray told the Wall Street Journal that many of the 100 ransomware variants under investigation are linked to Russia. Last month, Biden laid out his cyber strategy in an executive order.
Starting point is 00:06:54 April Falcon Doss says it's a good start. There are many departments and agencies across government that really have cybersecurity postures that lag behind where they should be. The government does face real limits when it comes to ransomware in private companies. The government won't be able to actively protect the private sector from any possible ransomware attack because, thankfully, the government doesn't control the internet, right? We wouldn't want that. Protecting the private sector falls to people like Adam Myers, vice president for intelligence at the cyber security firm CrowdStrike. These companies can't put their head in the sand and hope it's not going to happen to them.
Starting point is 00:07:34 It is going to happen to them. It's going to be a matter of when. Myers says too many companies aren't keeping their cyber defenses up to date. He cites the attack on the meat company, JBS, carried out with a malware known as R-Evil. Myers knows it well, but says many potential victims don't. I guarantee lots of organizations in the food processing world right now Googling how to find what is R-Evil. And if you need to look it up when it's happening, you're in a real bad spot. How bad? I ask what the current ransom demand is for an attack on a large company. I see the payments going out and the payments are just, you know, stomach churning figures,
Starting point is 00:08:16 you know, two, four, eight, 10, 30 million dollars. It's a price he believes many more companies will have to pay. NPR's Greg Myhre. Now, as we mentioned, at least one company already has paid a big price to ransomware hackers. Colonial Pipeline Company, which paid more than $4 million in cryptocurrency to hackers. As of Monday, the Justice Department announced that the majority of that money has since been recaptured by FBI investigators who'd been tracing the group behind the attack. In any event, it's true that not all cyber extortion attacks
Starting point is 00:08:58 end with a ransom payment. It's not a foregone conclusion that a company has to pay a ransom for sure. Bill Siegel runs Coveware. It's a company that responds to ransomware attacks and sometimes negotiates with hackers. He spoke to NPR's Rachel Martin about what ransomware negotiations look like from the inside. Well, at the end of the day, the goal is to find a way for the company to recover without having to pay at all. Does that ever happen? Oh, yeah, absolutely. A lot of times when an attack happens, it's very difficult for a big company to determine immediately what the situation is. Because if you're a large company, and you've got, you know,
Starting point is 00:09:35 10,000 servers globally, and you've got backups at, you know, 15 different locations throughout the globe, it can take days sometimes to actually safely check the integrity of those backups. And so when we're managing a large enterprise incident, you don't want to start negotiating when you realize you need it. You want to be done. And so we'll kick off negotiation knowing that a very likely outcome is that we actually don't end up paying. So you can be negotiating just to buy time. So the company can figure out if they have a backup and they can say, sorry, your threat's not good here because we're safe. Of course. Yeah, that's the goal, right?
Starting point is 00:10:11 The cost for a large company being down is so substantial that hours can mean the difference in millions or tens of millions of dollars of lost profit. Or in the case of a hospital or something, it can mean the difference between life and death. So you don't want to waste any time. You want to basically get to the finish line and be ready, even if the conclusion is, well, we don't need to do anything. And that's the best conclusion. Are you able to tell us the origin country of most of the cyber attacks that you see? We don't do very detailed attribution. What I would say is that the contributory factors that have led us to where we are today are as much socioeconomic as they are other things. There are such low barriers to entry to cybercrime. And there are lots of well-educated, sometimes STEM-educated individuals in lots of parts of the world. They don't have the job prospects that will pay them the money that they aspire to make. And sometimes their local jurisdictions are kind of out of the reach of Western law enforcement.
Starting point is 00:11:14 And it's, you know, while it may be sort of frowned upon, it's sort of condoned by wherever they live, right? Because the local economy actually benefits from the laundered proceeds of these attacks filtering back in. These people are buying houses and buying Starbucks and buying cars, and that's a good thing for the local economy, so they sort of look the other way. If a situation occurs, a cyber attack happens, the company is forced to pay ransom, what's to prevent those same hackers from six months, a year later, just coming back and doing the same thing again? Yeah, there's absolutely nothing is the answer.
Starting point is 00:11:52 One of the biggest fallacies and misunderstood aspects of these attacks is that they are like lightning strikes, right? It's like, oh, it happened once, it's not going to happen again. That's just, that's not the way it works. The groups that are carrying this out are part of a very well organized and a very large industry. If it is cost effective, i.e. cheap to attack a company and has a high likelihood of being profitable at low risk, they will do it and they will do it over and over and over again, just like any other business would do the exact same thing if they found a very cheap way to sell very high profit products.
Starting point is 00:12:30 You've seen this? Yeah, of course. If a company does not take it seriously and they don't fix the vulnerabilities that allowed it to happen in the first place, there's a 100% chance it happens again. Bill Siegel, the CEO of Coveware. He spoke to NPR's Rachel Martin on Morning Edition. It's Consider This from NPR. I'm Audie Cornish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.