March 15, 2024 | Issue 84

Back Issues

This Week on "Cybersecurity Friday"

This week we are going to look at one of the most common cyberthreats we all face today. Ransomware. This diabolical cyber danger surrounds us in our private lives, the organizations we work for and the companies we do business with. The threat of ransomware is everywhere. A week will not go by that a new ransomware attack was successful and a company or organization have been shut down as they struggle to investigate and try to recover.


Ransomware actually has a long and surprising history. We will find also out there is a lot you can do to protect yourself - and your organization.

Also - this week we report what important lesson the huge Roku hack has for all of us.

Back Issues Now Available!

All of our back issues are now available on the Borough Website if you want to revisit any exciting issue of "Cybersecurity Friday". Because each issue now focuses on a specific topic you can browse the back issue on our website if you want to learn more about a specific cybersecurity topic.


You can browse the back issues here or by visiting the Information Technology Department section at www.west-chester.com.

Cybersecurity All-Stars

It is our Cybersecurity All-Stars and all of our well-trained and informed co-workers that go a long way protecting all of us - and our organization. Remember! When you see an email or even a text message that is suspicious report it to the IT Department without delay. If you received it, others probably have as well. The quicker we respond, investigate and remediate the safer our organization is.

This week, Alexis in the Finance Department reported a suspicious message that was asking for financial information. This was an actual phishing message that somehow made it through to multiple staffers. Alexis reported it right away and we were able to investigate and remediate.

Together we protect our organization and each other.

91% of cyber attacks start with an email.

-source Barracuda

What is Ransomware?

Ransomware is a type of malicious software, or malware, that prevents you from accessing your computer files, systems, or networks and demands you pay a ransom for their return.


Ransomware attacks can cause costly disruptions to operations and the loss of critical information and data as well as damage the liability of the organization.


You can unknowingly download ransomware onto a computer by opening an email attachment, clicking an ad, following a link, or even visiting a website that's embedded with malware.


Once the code is loaded on a computer, it will lock access to the computer itself or data and files stored there. More menacing versions can encrypt files and folders on local drives, attached drives, and even networked computers.


Most of the time, you don’t know your computer has been infected. You usually discover it when you can no longer access your data, or you see computer messages letting you know about the attack and demanding ransom payments.

The Father of Ransomware

35 years ago, back in 1989 (yes that's right, 39 years ago) following the World Health Organization's AIDS conference Joseph L. Popp, a Harvard-educated biologist, mailed 20,000 floppy disks (pictured right) to event attendees. The packaging suggested the disk contained a questionnaire that could be used to determine the likelihood of someone contracting HIV.


In 1989 there was little cause to believe the disks were sent with bad intention. 


After making its way onto victims' systems, malware, dubbed the AIDS Trojan, used a simple symmetric encryptor to block users from accessing their files. A message appeared on users' screens demanding they mail $189 (screenshot below of the message) to a P.O. box in Panama in exchange for access to their files. Due to the simplicity of the virus, IT specialists quickly discovered a decryption key, which enabled victims to regain access without paying the ransom.

Jospeh L. Popp probably made little money off the scam; however his dastardly idea would eventually develop into a multibillion-dollar industry and cause him to be named the "father of ransomware."

What to Know About Roku's Big Hack


Roku sent a notice to its customers last Friday informing them that some accounts had been affected by a data breach.


Over 15,000 Roku customer accounts were reportedly breached,


The latest data breach involving Roku should be a reminder to you to always use unique passwords for each of your accounts — even for services like Roku that may seem less important than your online banking app, for example.


This type of hack is called a credential stuffing attack, and it's not Roku's fault. Rather, the hack is partly made possible by customers using the same passwords for multiple accounts they own.


Credential stuffing is when hackers use the same login credentials of one of your online accounts to log in to another. They typically get these username and password combinations from phishing schemes or data breaches. Sometimes, they'll even sell your login credentials to other hackers, who can then steal your information or use it to make purchases.


The good news is there are a few things you can do to protect yourself from becoming a victim of this type of attack.


The first thing you can do is always stay vigilant against phishing scams.


For example, never click a link you receive over email or text, even if it seems to be coming from a company you trust. Phishers will often message you from an email address that looks almost identical to the real company's address and get you to log in to a fake site that looks identical to the real site. Always go straight to the company's site using your search engine.


And perhaps most importantly, always use unique and hard-to-guess passwords for all your accounts.

Defining a Rasnomware Attack

Ransomware attacks typically start with a breach of your computer or network. Often, this breach is enabled by a successful phishing attack. For example, you might click on a suspicious link in an email that downloads ransomware onto your computer or gives an attacker access to your device.


Once an attacker is inside your computer, it can take as little as a few hours for them to deploy ransomware. The malware will automatically encrypt all of the files on your computer, effectively locking you out of your device. Once your files are fully locked up, many ransomware programs are designed to display a message with the required ransom, and further instructions for how to get in touch with the attacker.


At this point, you have a few options. If you’re prepared and have backups of all of your files, you can factory reset your device and restore your data from your backups. This can be a time-consuming process, but it should clear the ransomware from your device and allow you to get your data back.

Defending Yourself from Ransomware

The best way to defend yourself against ransomware attacks is to be proactive. Be suspicious of any links in emails, as these are a common source of ransomware. You can also use antivirus software to monitor for ransomware and remove it before it can lock up your files.


If you don’t already, you should use cloud backup software to keep copies of all of your files. That way, even if you’re the victim of a ransomware attack, you can recover your data without paying the ransom.


For companies, the best way to defend against ransomware is to keep your network as secure as possible. Identity management software that can help prevent ransomware from spreading throughout your organization, causing large-scale damage. It’s also important to educate everyone about how to avoid online phishing scams.

Signs of Ransomware

While it is not always easy to spot evidence of ransomware, there are frequently telltale signs to look out for. Cybercriminals on the lookout for potential victims can deploy several tactics to attack your property, which revolve around Trojans. These malicious chunks of code often appear as phishing emails, Remote Desktop Protocol, or perhaps emerge through vulnerabilities in software. This is why it's a great idea to ensure you have the latest and most up-to-date edition of your preferred software security suite in place.


There are two core ransomware areas that are most likely to cause you problems if you’re not prepared for them to strike. Locker ransomware is a form of malware that will effectively prevent you from accessing your computer or network. It has the potential to lock you out from accessing everyday tools and computer functions, such as using your desktop, mouse and/or keyboard. It may be one thing that targets specific features and functions, or the malware may cover all bases and prevent you using your machine or device altogether.


The other common route for cybercriminals to take on the ransomware warpath is to mobilize crypto ransomware. This is potentially a more damaging attack strategy because, where locker ransomware will not usually home in on your critical files, crypto ransomware can be used to encrypt crucial data. So, while this might allow your computer or mobile device to keep on functioning, it may well prevent you from accessing your files and folder. This type of attack can target everything from documents right on through to media like pictures and videos.

Ransomware Threats Are Here to Stay

Ransomware is a threat that’s unfortunately here to stay. Ransomware attacks can lock the files on your computer and hold them hostage until you pay a ransom to your attacker. If you don’t pay, you risk losing all of your files.


If you’re responding to a ransomware attack after it happens, you’re already too late. The best way to defend against ransomware is to recognize and avoid phishing attempts, install antivirus software on your computer, and back up all of your files.

Next Week...

Next week we are going to take a look at the 13 types of email threats you should be aware.

X Share This Email
LinkedIn Share This Email

William Mann, CGCIO | Borough of West Chester

Facebook  Twitter  LinkedIn