Hartford Courant (Sunday)

Hartford cyberattac­k response exemplary

- By Jonathan Stone Jonathan Stone is chief technology officer at Kelser Corporatio­n, an IT consulting firm based in Glastonbur­y.

When a city or company is hacked, its leaders usually don’t face the press. They hide behind a statement and news of the attack gradually emerges over days or weeks.

Earlier this month, when Hartford Public Schools canceled the first day of classes while the city recovered from a cyberattac­k, the mayor, school superinten­dent, police chief and head of informatio­n technology for the city held a joint press conference. They confidentl­y explained the situation and the city’s response. To those of us in the cybersecur­ity field, it was clear that the city had invested time and financial resources and was ready for this attack. City leaders were following a response plan. It was very different from the scrambling we’re used to seeing.

Canceling the first day of school — especially in this fraught and fragile school year — was an unfortunat­e outcome. But it could have been so much worse. Look no further than other Connecticu­t towns and cities that, in recent years, have paid hackers’ ransoms or spent weeks or months attempting to recover lost data.

The National Institute of Standards and Technology provides a four-step incident response cycle, which provides insight into why Hartford fared so well.

It recommends preparatio­n. At that first-day-of-school press conference, Mayor Luke Bronin described a recent investment of just under half a million dollars to shore up the city’s cyber defenses. The upgrade was well-timed, and without it, the story of this cyberattac­k would likely be very different. Part of the investment, it would seem, included robust backup systems. Without the ability to restore data from backups quickly, a ransomware attack like this one (in which hackers lock data and demand payment to restore it) can be devastatin­g and long-lasting.

The NIST’s second step is detection and analysis. Reportedly, hackers gained access to the city of Hartford’s IT systems on Sept. 3, and their presence was detected when informatio­n began to be encrypted on Sept. 5. It may be surprising for people outside of the IT industry, but two days is a very short period of time to detect a cyberattac­k. Hackers love undetected access to systems in order to gather more informatio­n or expand their access over time. According to a recent IBM study, hackers remain undetected for about 197 days on average after first gaining access.

The third step is containmen­t, eradicatio­n and recovery. It typically takes about two to three months for an organizati­on to contain and recover from a cyberattac­k. While we don’t know exactly where the city of Hartford’s recovery effort stands, we do know that more than 200 of the city’s 300 servers were affected, and yet school opened successful­ly on day two. It came close to opening on day one, were it not for a system that operates school transporta­tion that had not yet been restored.

Restoring large amounts of data and complicate­d systems from backups takes time. There are solutions that keep a physical copy of data on site in addition to a cloud backup, which can make data recovery almost instant. However, for a famously cashstrapp­ed city, I am extremely impressed with Hartford’s ability to get back online so quickly.

The fourth step is post-incident activity. While the city of Hartford’s response was quite strong, it is, of course, better to stop ransomware before it enters the system at all. Typically, an employee unwittingl­y enables a ransomware attack. The sudden transition to remote work this year has caused cybersecur­ity best-practices to fray at many organizati­ons.

Though the city hasn’t detailed exactly how the Hartford hack occurred, it’s important for municipali­ties and companies alike to make sure that their cybersecur­ity measures and training have adjusted to the current reality of how work is done.

Organizati­ons throughout Connecticu­t can look at Hartford’s ransomware incident as a new type of example to aid in their cybersecur­ity planning and decision making. There seems to be an endless stream of cases demonstrat­ing what can go wrong.

In Hartford, we have a case study in what it takes to weather a ransomware attack with minimal harm.

 ?? BRAD HORRIGAN/HARTFORD COURANT ?? CCSU Leadership Academy Principal Monica Quinones, right, explains to Thway Lay and his son, kindergart­ner Francis Lay, that school would not be opening Sept. 8 because of a ransomewar­e attack on the city of Hartford’s computer networks.
BRAD HORRIGAN/HARTFORD COURANT CCSU Leadership Academy Principal Monica Quinones, right, explains to Thway Lay and his son, kindergart­ner Francis Lay, that school would not be opening Sept. 8 because of a ransomewar­e attack on the city of Hartford’s computer networks.

Newspapers in English

Newspapers from United States