ICAEW.com works better with JavaScript enabled.

Cybercrime: how to rebuild after suffering a breach

Author: ICAEW Insights

Published: 13 Oct 2021

A cyber attack can be enormously costly for an organisation. Here’s how to respond and recover quickly.

In May this year, Colonial Pipeline, a large oil pipeline system that supplies a large area of the US, was hit by a ransomware attack, forcing them to shut down all of its pipeline operations. It took five days before it was able to restart its operations, and six days before it was fully back up and running. 

“Imagine shutting down your business for six days,” says Kevin Wong, managing director of FTI Consultants Middle East, on a recent ICAEW webinar. “Imagine the costs, the unfulfilled contracts, the knock-on effect to your business.”

Colonial Pipeline ended up paying its attackers, the Russia-linked cybercriminal group known as DarkSide, around $4m. On top of that, it had to factor in the cost of investigation, remediation and regulatory fines. It lost intellectual property, client data, and share value.

“In the Colonial attack, the bad guys hit them with the double whammy of not only encrypting the data, but stealing some of it and threatening to release it unless they paid the ransom,” says Wong. “We've seen other ransom-type events where the bad guys introduce a third threat of distributed denial of service attacks, which would prevent your web services from working.”

So when the costs of a data breach are so high, how can organisations recover and rebuild quickly, with the minimum possible damage to their bottom line and reputation?

Bring in your back-ups

You should have all of your data backed up somewhere outside of your main system. It’s important to have a solid back-up execution plan to ensure that you can recover your business quickly, explains Patrick Wong, Director, cyber security and privacy, PwC Hong Kong. It’s important to have tested this plan before an attack to make sure it is fully recoverable. 

Secure your baseline

This means shutting down some of the routes that attackers or ransomware will try to infiltrate. For example, a remote desktop client that staff might use. The Microsoft task automation and configuration management program PowerShell is often used by hacker groups, says Patrick Wong. If your organisation uses it, make sure you disable it, and programs like it, quickly. “Disable unneeded services and limit your exposure.” 

Keep a log

It's important to enable logging on your systems, says Patrick Wong. This will help you to conduct an investigation quickly and easily, allowing you to review your systems and improve your defences after a breach. “In a lot of the incidents that we investigate, there are no log trails that we can go in and investigate. So make sure that you have centralised logging, and make sure that your logging coverage is good. That will definitely help, even in the unfortunate event that you have been attacked.” 

Let someone take charge

A lot of panic often follows a successful cyber attack, explains Kevin Wong. Without strong leadership, it can easily devolve into a blame game. You need someone who understands the issue and its impact and is able to communicate effectively with stakeholders. 

“You definitely need to include on your incident response team, general counsel, internal audit, the technical lead, perhaps strategic internal and external communications, external counsel, if necessary.”

Contact your insurers

“If you've got cyber insurance, you will need to contact your insurance provider and they'll probably put you in contact with a loss adjuster,” says Kevin Wong. Your incident response team at this time should be looking to address a number of questions at this time. What's happened? Are the attackers still in the network? If they are, how can you stop them moving across your network? How do you kick them out, and from coming back in again?

“Often ransomware events would require the deployment of an endpoint detection system that should cover all of the network, detect suspicious behavior and files, and isolate machines to stop further infection.”

Should you pay?

While Colonial paid their ransom, it’s not recommended, says Kevin Wong. There’s no guarantee that the attackers won’t be back again in six months. You also need to consider how to convert your cash into Bitcoin or some other crypto currency, as ransomware attackers prefer to be paid in this manner. It’s best not to give into their demands. 

Communicate strategically

You will have to communicate with law enforcement that you have had a data breach, but there are others you will need to reach out to. You need to work out what you are going to tell your clients and your employees. You may have to notify the regulator depending on what data have been captured. Tell them what has happened, what functions you can still perform on your network, and what steps you have taken to mitigate the damage. Is your data being published? 

Review with your team

As a team, sit down, review all aspects of the incident – when it happened, how it happened and the consequences – and investigate what went wrong and what you could have done better. Undertake a thorough investigation into the incident to identify the weaknesses that the attackers exploited. “Understand the attackers movements across the network, you'll then be able to understand what data was at risk of compromise,” says Kevin Wong. “Regulators will often look more favorably on those organizations that took action and properly investigated things after an attack.”

Cybercrime Awareness Month 2022

ICAEW marks the global Cyber Security Awareness month with a series of webinars, videos, podcast, a panel discussion and other resources addressing cybercrime and how to protect your business. We will focus on the latest trend as well as supply chain risks and concerns.

Payment online

More support

ICAEW Community
Data visualisation on a smartphone
Data Analytics

Helping finance professionals develop the advanced data analytics and visualisation skills needed to succeed in this insight-driven era.

Find out more
Charity Fraud Awareness Week
Charity Fraud Awareness Week 2
Charity Fraud Awareness Week 2021

Charity Fraud Awareness Week will raise awareness of fraud and cybercrime affecting the sector to create a safe space for charities and their supporters to talk about fraud and share good practice.

Resources
Keep up-to-date with tech issues and developments, including artificial intelligence (AI), blockchain, big data, and cyber security.
Technology

Keep up-to-date with tech issues and developments, including artificial intelligence (AI), blockchain, big data, and cyber security.

Read more
Open AddCPD icon

Add Verified CPD Activity

Introducing AddCPD, a new way to record your CPD activities!

Log in to start using the AddCPD tool. Available only to ICAEW members.

Add this page to your CPD activity

Step 1 of 3
Download recorded
Download not recorded

Please download the related document if you wish to add this activity to your record

What time are you claiming for this activity?
Mandatory fields

Add this page to your CPD activity

Step 2 of 3
Mandatory field

Add activity to my record

Step 3 of 3
Mandatory field

Activity added

An error has occurred
Please try again

If the problem persists please contact our helpline on +44 (0)1908 248 250