Content, Ransomware

Ransomware Attacks MSP, Encrypts 100 Customers: Report

A ransomware attack has spread from a Colorado MSP (managed IT services provider) through remote access software to more than 100 dentistry practices, KrebsOnSecurity reports.

The ransomware attack apparently hit Complete Technology Solutions of Englewood, Colorado, though the MSP has not commented about the situation, and MSSP Alert has not independently confirmed the report.

The attack apparently involved remote access software that did not have two-factor authentication (2FA) activated. Black Talon Security of Katonah, New York has been assisting some of the dental practices with the recovery effort, KrebsOnSecurity added in a December 8 update.

Dentist offices remain a prime target for ransomware attacks because the businesses are generally profitable and have mission critical applications like electronic health records (EHR), imaging and customer relationship management (CRM) systems.

Amid that reality, PerCSoft, a Wisconsin company that provides an online data backup service for dental offices, suffered a ransomware attack in August 2019. The ransomware encrypted files for approximately 400 U.S. dental offices.

FBI Ransomware Warnings to MSPs

The FBI and U.S. Department of Homeland Security have repeatedly warned MSPs and their technology platform providers about such attacks.

Although MSPs and their software providers have generally raised their defenses in 2019, attacks have continued and some corners of the MSP industry now face a “crisis of credibility, ChannelE2E and MSSP Alert believe.

Still, more signs of progress are emerging. Thousands of MSPs are activating two-factor authentication as a means to stop hackers from entering systems. In many cases, software providers are activating 2FA as a default setting. And increasingly, the 2FA setting is mandatory.

Still, 2FA isn't a cure-all for ransomware attack mitigation.

MSPs Fighting Ransomware: Basic First Steps

To get ahead of the ransomware threat, MSSP Alert and ChannelE2E have recommended that readers:

  1. Sign up immediately for U.S. Department of Homeland Security Alerts, which are issued by the Cybersecurity and Infrastructure Security Agency. Some of the alerts specifically mention MSPs, CSPs, telcos and other types of service providers.
  2. Study the NIST Cybersecurity Framework to understand how to mitigate risk within your own business before moving on to mitigate risk across your customer base.
  3. Explore cybersecurity awareness training for your business and your end-customers to drive down cyberattack hit rates.
  4. Connect the dots between your cybersecurity and data protection vendors. Understand how their offerings can be integrated and aligned to (A) prevent attacks, (B) mitigate attacks and (C) recover data if an attack circumvents your cyber defenses.
  5. Continue to attend channel-related conferences, but extend to attend major cybersecurity events — particularly RSA ConferenceBlack Hat and Amazon AWS re:Inforce. (PS: Also, keep your eyes open for PerchyCon 2020 — more details soon.)
Joe Panettieri

Joe Panettieri is co-founder & editorial director of MSSP Alert and ChannelE2E, the two leading news & analysis sites for managed service providers in the cybersecurity market.