.post-body img { max-width: 100%; max-height: auto; display: block; margin: auto; }

Public Sector in Toronto, Canada Faces Cybersecurity Crisis Amid Surge in Ransomware Attacks





1.Summary


With cyberattacks on the rise day by day, even public institutions are not free from such attacks either. In late October, the Toronto Public Library was severely affected by an email attack from the ransomware group Black Basta. Crimes have been committed through malicious attachments and URLs in emails. As these types of attacks can lead many people to be targets of crimes through accidental clicks in our daily lives, proactively responding to potential threats is important. It is possible by understanding the types of these attacks and countermeasures specified in the international email security standards of the International Telecommunication Union (ITU).

 

 


 2.Overview



According to Deloitte, 91% of all cyberattacks begin with emails to victims. Despite years of attempting to educate users extensively on the risks and risk detection methods of emails through media and corporate security programs, these attacks are still evolving.


A recent report by the European Union Agency for Cybersecurity highlighted the increasing vulnerabilities in public administration and governments. These sectors, including education institutions, are frequently targeted because they possess extensive amounts of sensitive information, including citizen information, financial details, and government operations data. Attackers can exploit and monetize this data for identity theft, financial fraud, or selling it on the dark web. In addition, the urgency and pressure to quickly address the issue are heightened because these organizations often manage critical infrastructure and services essential to daily life. Interruptions caused by phishing email attacks can lead to confusion, increasing the likelihood of complying with ransom demands. This article aims to highlight solutions that can proactively respond to sophisticated cyberattack tactics.




 3.Attack Case Analysis - Attack Type



Ransomware attacks on public institutions in Canada, including York University (2020), TTC (2021), London Public Library (2023), and Toronto Zoo (2024), have occurred steadily since 2020. According to the Canadian Centre for Cybersecurity’s 2023-2024 national cyber threat assessment report, ransomware has become the “most disruptive form of cybercrime facing Canadian organizations.” Solutions to proactively prevent these types of attacks are outlined in the standards registered with the International Telecommunication Union (ITU), which is a specialized agency of UN. This article aims to analyze these types of cyberattacks and allow targeted companies to respond to potential threats.


Case: Ransomware attack on the Toronto Public Library (TPL) caused by Black Basta – Malware in an attachment, Malware in uniform resource locator


On Sunday, October 29, the Toronto Public Library (TPL) branch manager received a call from his supervisor with urgent news: "We’ve had a cybersecurity incident. We need you to activate the phone tree. Contact the staff and inform them of the situation. We're unsure of the scope, and we don't have computer access." When he checked, the "tpl.ca" site was offline, preventing access to online accounts and disabling services such as public computers, printing, and the “Your Account” feature at library branches.

Although the entire computer system went down, TPL officials did not attribute the attack to a specific ransomware operation, nor did they confirm the identity of the attacker. However, 48 hours later, an online publication, 'BleepingComputer,' revealed that the Black Basta ransomware gang was behind the attack after seeing a photo of a ransom note displayed on a TPL workstation.

Black Basta aimed to gain access to the computer network through various means, including phishing emails, infected ZIP files on websites (URLs), and malicious attachments. When a user downloaded an infected ZIP file, malware infiltrated the network, deactivated the antivirus system, located data repositories (including backups from so-called Mirror sites), and encrypted them to prevent network owners from accessing the data. The attacker then threatened to demand payments in cryptocurrency for the data's return or to post the stolen data on a public website, making it accessible to anyone.


Figure 1. Black Basta attack lifecycle based on Unit 42 incident response cases (Unit 42 2022)

 

This type of attack is outlined in the international standards sections [7.1 Malware email attacks]. Attacks using malicious code can be divided into two types: phishing mail that leads to secondary and higher destinations through URLs, and inserting malicious codes into the URL in the attached file.

In the realm of email security standards, these types fall under the category of [7.1.2 Malware in an attachment] and [7.1.3 Malware in uniform resource locator]. These standards carry international credibility, being registered with the International Telecommunication Union (ITU), a specialized agency of the UN.

A malicious attachment is one type of threat in which attackers conceal malware inside commonly emailed files. The attachments within these malicious emails can be disguised as documents, executable files or even image and video files. These files can also be encrypted with other extensions. Attacks using executable files may involve spoofing the sender's address to deceive the recipient into opening emails with malicious documents.

A malicious URL attack is made by inserting a clickable link containing malware in emails to induce users to visit malicious websites. Also, malicious URLs can be contained in a large attachment or the body of an email. This can be an attack that causes malware to be executed when a user clicks on a URL in an email or regular attachment, not only at the time of delivery.




 4.Attack Case Analysis - Solution



To protect valuable information assets from these types of malicious attachments and URLs, Compliance with the requirements and countermeasures specified in the international standards is important.


Adhering to ITU-T X.1236 Standards Clause 8.1 and 9.1, [Security requirements to counter malware email attacks] and [Countermeasures for targeted email attacks], can lead to effective solutions and proactive measures.


To counter malware in an attachment attacks, the following requirements must be met:

  • It is recommended to detect a forged file extension in various file formats. 

By implementing this security requirement, proactive measures against malware in an attachment attacks can be taken as follows:

  • Big data-based inspection scans all inbound and outbound email data of users on a regular basis via cloud service to extract malicious attachments that require further inspection. It determines whether there is a risk of targeted email attacks based on the data stored in the big data system. This feature identifies and detects a forged file extension. 

To respond to malware in uniform resource locator attacks, the following security requirements must be met:

  • It is required to trace the final destination of URLs within multiple linked URLs while checking all URLs for malware.

By implementing this security requirement, proactive measures against malware in uniform resource locator can be taken as follows:

  • URL image conversion disables opening a URL link in a perceived dangerous environment where the attached malicious URL is recognized.

 

Complying with these proactive measures can effectively reduce the risk of targeted email attacks with those types of attacks above. Moreover, to understand and respond to these attacks, it is necessary to be aware of and adhere to international email security standards, using solutions that follow them. Mail Inspector Platform provides solutions that align with these necessary functional requirements.




 5.Conclusion



Organized cyber attacks are becoming an increasingly significant threat to governments. The government is at risk of being a victim of any cyber attack, and the damage is blamed on its employees and the general public. Email security standards play a pivotal role in providing solutions to cope with advanced email attacks. Diagnosing email security based on ITU-T X.1236 is a proactive defense against hacking technologies. Compliance with international email security standards can be initiated by conducting a thorough diagnosis of email security standard adherence through Mail Inspector.


 

 

 6. Reference


<91% of all cyber attacks begin with a phishing email to an unexpected victim>

https://www2.deloitte.com/my/en/pages/risk/articles/91-percent-of-all-cyber-attacks-begin-with-a-phishing-email-to-an-unexpected-victim.html

 

<SPACING INVESTIGATION: TORONTO PUBLIC LIBRARY RANSOMWARE ATTACK, PT. I>

https://spacing.ca/toronto/2024/03/27/spacing-investigation-toronto-public-library-ransomware-attack-pt-ii/

 

<Toronto public library outages by black basta ransomware attack>

https://www.bleepingcomputer.com/news/security/toronto-public-library-outages-caused-by-black-basta-ransomware-attack/

 

<Toronto Public Library confirms data stolen in ransomware attack>

https://www.bleepingcomputer.com/news/security/toronto-public-library-confirms-data-stolen-in-ransomware-attack/

 

<Threat Assessment: Black Basta Ransomware>

https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/


*The images used in this post were generated using artificial intelligence (AI).

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Post a Comment

0 Comments