Brad Paubel is the Chief Technology Officer and Chief Operations Officer at Lexicon, a legal technology and services company. Learn more at lexiconservices.com.
Ransomware is a massive problem. A $20 billion problem in 2021, to be exact. Any business and organization can be a target—including and especially law firms. That’s because, like banks and hospitals, law firms possess a significant amount of sensitive data entrusted to them by clients. That can prove irresistible to ransomware hackers, who are increasingly organizing sophisticated operations that run like a business, except their focus is cybercrime.
There is also much at stake for any business that falls victim to a ransomware attack. In addition to having sensitive information fall into the hands of organized criminals, those bad actors can demand as much as $700,000 per server to release data. The average total ransomware amount paid is now around $1.2 million per incident. There is also the uncertainty as to whether cyber criminals can be trusted to decrypt the data when a ransom is paid and not sell it on the so-called dark web to other nefarious individuals.
Thankfully, there are ways lawyers and law firms can protect themselves to both prevent a ransomware attack and even stop one that’s in progress before a situation becomes dire. In addition, it is not always necessary to pay a ransom—but that will depend on how quickly a breach attempt is spotted and stopped.
Ransomware attacks happen when a bad actor tricks someone in an organization to click on a link or download a file that installs a virus on their computer. This activity is called “phishing” and can involve hundreds of attempts against any computer user on a given network. Once downloaded, that malware will start to encrypt all the files on that individual’s computer—and then move on to any system connected to that computer. The malware does not stop with one computer or device: anything on the same network will soon be vulnerable.
These attacks are organized and directed. Sometimes there are hundreds of people working together to penetrate a particular business. They also do their research and will tailor ransom demands to the size and revenues of the designated target.
Once a network is infected and as many files as possible are encrypted, users will receive a ransom demand asking for payment of a certain amount of money—usually in Bitcoin or another untraceable cryptocurrency—to have the attackers decrypt the files. Previously, paying the ransom would unlock the data. More recently, however, ransomware criminals have taken ransom payments and unlocked files but then also keep the data and offer it for sale on the dark web. Yet another reason why preventing a ransomware attack in the first place is so important.
A ransomware attack does not happen without visible signals that, if noticed, can prevent substantial damage from happening. These are the most common warning signs:
Prevention is the best way to avoid problems with ransomware attacks. It begins with training everyone who accesses a computer at the firm—both lawyers and staff—to recognize the above signs. Then, procedures should be put in place to inform employees of the actions to take if something is discovered (i.e., alert a supervisor or the IT department).
Since the level of technical knowledge within firms can vary quite a bit (even in 2021), there are ways to help identify where problems might exist. Some tools are available, for example, that will send fake phishing emails within an organization to test for vulnerabilities. Essentially, this simulates a ransomware attack and can give valuable information to tailor education around the common pitfalls.
Firms should also establish routine procedures for regularly backing up data, preferably to the cloud or to an offsite location. That way, if there is an attack, a clean backup is available to reinstall once any trace of malware is removed from the onsite systems. Cloud backup services also regularly scan data for malware and other viruses, which acts as a stopgap to any measures a firm has in place.
These precautions and prevention measures apply to firms of any size. In fact, solo firms might be even more vulnerable as most do not have full-time IT staff.
Having robust preventative measures in place means it’s far more likely a law firm can stop a ransomware attack before it gets rolling and corrupts an entire network. The steps to follow in an ideal situation where only one computer is infected include:
These steps can be applied to most ransomware attacks, even if malware has spread throughout a network. It will just take longer and perhaps cost more to ensure every trace is gone. Again, having a recent backup on a cloud server is key to recovering.
Doing this will also increase the likelihood that the firm will not have to pay to have its data released, and it might not even lose anything important if the cloud backup is recent enough.
The vital thing to know about ransomware attacks is that all firms are vulnerable and, more than likely, will experience a ransomware attack at some point. How severe, disruptive, and expensive it is will depend on whether staff and attorneys are trained to spot early signs and the procedures put in place to deal with phishing attempts. Even if malware spreads, a firm shouldn’t panic and immediately give into ransom demands. A methodical approach that involves isolating affected computers, and servers, rooting out the malware, and then restoring from a clean cloud backup can usually deal with the situation.
Brad Paubel is the Chief Technology Officer and Chief Operations Officer at Lexicon, a legal technology and services company. Learn more at lexiconservices.com.
All Rights Reserved | This website is brought to you by Sticky Media.