On the dark side of digital space, ransomware and cybercrime is on the rise in skills, sophisification, quantity and frequency. Ransomware is a form of malware that encrypts victim data or locks down systems, disrupting the operations of victim organizations by rendering their data and systems inaccessible. Ransomware actors subsequently demand a ransom, usually in cryptocurrency for anonymity, in exchange for decrypting the data. It should be noted that the deployment of ransomware code onto an organization’s network follows a legitimate (trusted insider) or illegitimate breach of that network, exploration of the network by cybercriminals, and the theft of organizational information and data. The deployment of ransomware is generally the final phase of a successful hack or penetration on that organization.
With TTPs becoming ever more sophisticated, the facilitation of ransomware attacks by organized crime groups has expanded to include double and triple extortions – where the initial ransomware attack is compounded by the theft of sensitive company data, ransom demands from victims with the threat of publicly shaming them through the release of stolen information and the re-exploitation of previously-exposed vulnerabilities within organizations to leave them facing a never-ending cycle of ransomware attacks.
Capable of bringing Non governments, business and supply chains to a grinding halt, the impact of ransomware attacks also has a reputational impact on victims alongside the economic impact, with the latter evidenced in research from INTERPOL’s private partner, Trend Micro, lookout etc
NGOs and small business are no stranger to this growing trend, and are often the victim of attacks targeting critical yet vulnerable infrastructure such as health, water and food. Over 50% of NGOs report being targeted, as a growing number of recent incidents illustrate.
As recently as May 2021, a large NGO dealing with health related issues, was hit by a ransom ware attack that encrypted vital information in its data systems, some of which were lost as a result. The organization refused to pay the ransom of 500 M UGX and has since recovered from the attack and put measures in place to prevent a recurrence. .
Another common scam used against NGOs and nonprofits is CEO Fraud. The hybrid method combines spearfishing and identity theft to trick NGOs into making wire transfers. It’s already cost Save the Children US$ 1 million in 2018 and one local big NGO was able to detect it as it was going to suffer a loss of 600M Uganda shillings in August,2022.
The existential risk to NGOs in critical sectors
NGOs involved in humanitarian and other actions are heavily dependent on mobile and digital technologies to coordinate and fulfil their missions. They often operate in regions with limited or unreliable infrastructure that can expose them and employees to acute risk of data interception, tracking, or unauthorized access with potentially lethal consequences for volunteers, beneficiaries and other stakeholders. NGOs and small businesses may also be targets of malicious and politically motivated cyber-attacks such as web defacement, phishing. These may involve hijacking and misusing their identities and websites to misdirect resources and volunteers and spread malicious misinformation.
As organizations whose primary function is the sourcing and distribution of aid and raising awareness of community pressing issues, these actions can have a crippling impact on their ability to function and respond to a crisis. Such attacks put huge pressure on NGOs’ limited resources. They not only prevent NGOs from fulfilling their missions in the short-term, they can also inflict long-term reputational damage and undermine the confidence in its ability to fulfil its role in current and future crises and emergencies. As a result, donors, sponsors and host nations may cancel their relationship with an NGO and withhold its mandate, resulting in its termination.
Prevention better than the cure
Despite the risks, most cyber-attacks exploit known or basic vulnerabilities that can easily be prevented by taking simple precautions. Black hat hacking is in many respects a sophisticated form of burglary. Just like a break-in, it’s often simple carelessness that lets an intruder in the door. The simplest and most basic precautions can prevent a breach. Slightly over 20% of NGOs have already partially developed cyber security frameworks and have introduced awareness training for their staff. However, lack of resources may mean many organizations are unable to employ dedicated staff toward comprehensive cyber protection.
CITES Uganda trading as CITES Cybersecurity solutions, offers support and managed IT Security services, as a collaborative partner for NGOs and small medium business to help them prepare for, detect, prevent and recover from cyber-attacks, thus protecting your digital valued assets such as Emails, mobile phones, endpoints, servers, networks etc. In today’s constantly evolving cyber threat landscape, firewalls and antivirus protection are not enough. Organizations of all sizes need the capabilities to protect, detect, and respond to increasingly sophisticated cyber-attacks. We monitor your network, discovering vulnerabilities, investigating attacks, and alerting you to real threats.
You don’t have time to comb through thousands of security events each day. With our Worry-Free Business Services helps lessen the workload by providing an all-in-one lightweight agent with an intuitive cloud-based console that gives you in-depth visibility and control across your entire organization. Our sophisticated threat intelligence platform backed by 24/7 expert security analysts alert you to real threats, with fast and accurate information.
We look forward to working together and building solutions to combat this growing threat.
Please contact us at: soc@citesuganda.com. info@citesuganda.com to learn more and we support.