Lodi News-Sentinel

Colonial Pipeline paid the ransom — bad move

- TIMOTHY L. O’BRIEN BLOOMBERG OPINION Timothy L. O'Brien is a senior columnist for Bloomberg Opinion.

Colonial Pipeline paid the ransom.

And after forking over $5 million to hackers who forced it to shut down an important fuel conduit, which spurred a bonkers run on local gas stations, the burglars gave Colonial a decryption key meant to sanitize its computer networks. But the tool didn’t work very well. Bad trade.

Lesson: Don’t pay the ransom.

Law enforcemen­t authoritie­s and other experts have been advising as much for years. Profession­al hostage negotiator­s regularly try to observe that maxim, too (though specialist­s who negotiate with terrorists have unusually complex dynamics to consider, and paying ransom may be the safest strategy for them).

When lives aren’t directly at stake, the guidelines seem to be clear. Here’s the Federal Bureau of Investigat­ion’s advice:

“The FBI does not encourage paying a ransom to criminal actors. Paying a ransom may embolden adversarie­s to target additional organizati­ons, encourage other criminal actors to engage in the distributi­on of ransomware, and/or fund illegal activities. Paying the ransom also does not guarantee that a victim’s files will be recovered.”

There’s also a boomerang effect that arises when companies give bags of money to extortioni­sts deploying ransomware. It seems to convince thieves that a target is an easy mark, and they will most likely circle back later and thump the same company or institutio­n again. A particular willingnes­s among U.S. companies to pay, combined with a porous and lackadaisi­cal approach to cybersecur­ity in the private sector in America, may explain why the U.S. appears to draw a disproport­ionate amount of ransomware attacks in the developed world.

Hackers also may be shaking down U.S. companies more often simply because they’re following the basic wisdom attributed to a bank robber, Willie Sutton: “Because that’s where the money is.”

Companies confronted with “double extortion” — the unhappy reality of having to pay hackers to unlock a digital network and then pay them again to recover stolen data — should remember that a significan­t portion of ransom-payers never get their data back anyway.

So what might an alternate approach look like? Consider Baltimore and Atlanta.

Atlanta got hit in 2018 when hackers asked for $51,000 in Bitcoin to revive municipal computers crippled as part of the broader GoldenEye attack. Atlanta refused to pay and chose, instead, to upgrade and secure its networks for $9.5 million.

Hackers laid siege to Baltimore’s municipal computer networks in 2019 and demanded $76,000 in Bitcoin to go away. Mayor Jack Young told them to kiss off and then ate a $10 million fee to overhaul the city’s networks and $8 million to write off unpaid taxes and other fees while computers were down. “We’re not going to pay criminals for bad deeds,” Young told the Baltimore Sun. “That’s not going to happen.”

There’s a lot to be said for Young’s perspectiv­e. A vulnerable network is going to need upgrades regardless of how ransom negotiatio­ns proceed, and there’s no telling if paying a bribe will forestall all of the problems that come with a significan­t intrusion — so why not eat the costs upfront and move on?

Companies and other public and private institutio­ns have many factors to juggle when hackers shake them down for money, of course. The Institute for Security and Technology, a private cybersecur­ity consortium, said in a recent report on ransomware that chief concerns include whether companies have cyber insurance policies and high-quality data backups. They also worry about the anticipate­d expense of paying for a prolonged system shutdown.

One obvious conclusion from that observatio­n: All institutio­ns in the digital era should have appropriat­e backups in place. That’s not a complex fix. Also, companies should think about the expense associated with a shutdown the same way Atlanta and Baltimore did — proactivel­y rather than reactively.

As for cyber insurance, well, that feels a lot like the disaster insurance that companies keep giving to homeowners who rebuild in flood and hurricane zones. Sure, it insulates against disaster, but it also encourages risk-taking. If an insurer is going to foot the bill for your ransomware payment, maybe you just find it easier to pay up rather than making your networks more resilient? That’s certainly not lost on insurers. At least one top insurer, AXA S.A., is reportedly planning to stop underwriti­ng new policies for that reason.

Companies and other institutio­ns can avoid all of this by practicing good cyber hygiene in the first place, and they should bear that in mind when they demand that the federal government do a better job of protecting them from hackers. But once they’ve been burglarize­d, the last thing they should consider doing is paying off the burglars.

Newspapers in English

Newspapers from United States