You are on page 1of 4

TM-RE News Issue No.

27 | November 2022

Current Status of Cyber-Attacks and


Required Countermeasures

There is no doubt that information systems are now essential resources for the lives of individuals and for
the activities of governments and companies. On the other hand, cyber-attacks aimed at disrupting or
destroying information systems or stealing information from them are on the increasing worldwide, and the
attacks are becoming more large-scale and diverse, making them a serious risk for both governments and
businesses. Furthermore, in recent years, cyber-attacks via the supply chains and cyber-attacks targeting
overseas subsidiaries, whose countermeasures are considered to be weaker than those of the head offices,
have been increasing, requiring a wider range of responses from each organization.
This article provides an overview of cyber-attack risks, which are considered relatively difficult to
understand for those outside the information systems sector, and introduces the characteristics of incidents
that have occurred in recent years and the responses required from each organization.

1. Outline of Cyber-Attack Risks


are targeted locally against individual information
Since the explosive spread of the Internet in the systems, However, as today's information systems
early 1990s, all assets, whether wired or wireless, are linked to each other through networks, their
PCs or equipment, are now connected via impact can spread throughout the network.
networks and we live in an era of information
distribution. At the dawn of the Internet, it was Furthermore, cyber-attacks on satellites have
only intended for use within organizations, and been increasing in frequency in recent years. For
many local networks were easily accessed by example, if a cyber-attack on a satellite used for
unauthorized intrusion from the outside. This has observation disables its functions, weather
became the cause of “cyber-attacks” that have forecasting becomes impossible, and if a cyber-
continually plagued government organizations, attack on a satellite used for location information
private companies and individuals to the present disables its functions, car navigation systems and
day. For example in Japan, the amount of cyber- smartphone navigation functions become unusable
attack-related communication data observed and
extensively. The shutdown of weather satellites
confirmed in a year has increased 66-fold in the
has a major impact on the fishing industry, which
last 10 years from 2012 to 2021. It is expected
that cyber-attacks will continue to increase in the uses weather forecasts to consider if to sail, and
future. the wholesale and retail industry, which considers
what items to stock and how much to stock on any
Total annual number of observed packets* given day. Thus, the threat of cyber-attacks is
related to cyber-attacks (billion)
becoming more widespread and serious.
5705
6000 5180
5000 2. Incidents in Recent Years
3756
4000
3000 2169 1) 10 Major Threats to Information Security in 2022
2000 1440 1559
128.8
631.6 In the "10 Major Information Security Threats
1000 78 241 2022" paper published by the Information-
0 technology Promotion Agency, Japan (IPA),
threats related to cyber-attacks account for
* Number of packets: amount of data in packets 60% of the total, but the breakdown is
(one of the data communication methods).
completely different from 10 years ago.
Networks have expanded from within The table in the next page shows the case of
organizations to inter-organizational links, now Japan. Since the internet world is borderless,
extending to home appliances such as lights,
it is considered that the situation in other
televisions and air conditioners and the
countries to be the same. From this table, you
smartphones that operate them, to cars with
communication functions, to excavators and other can understand that it is not enough to take
heavy machinery on excavation sites and the the same measures against cyber-attacks every
system centers that manage them. Cyber-attacks year.

-1- @ Tokio Marine Asia Pte. Ltd. All Rights Reserved


TM-RE News Issue No. 27 | November 2022

[Actual Case 1]
Rank 2022 2012
In 2020, a major Japanese video game
Damage caused by
1st Targeted attack manufacturer, Company A, received
ransomware
unauthorized access from a third party,
Theft of confidential
Business suspension resulting in the spread of ransomware infection
2nd information by
due to disaster within the company's internal network. The
targeted attacks
cybercrime group “Ragnar Locker” stole
Attacks exploited
Attacks by common confidential information, including personal
3rd weaknesses in the
thought groups data of customers/employees/applicants for
supply chain
employment and secrets of marketing,
Attacks aimed at new- Attacks targeting
encrypted the data and demanded USD
normal working style client software that
4th 11million in Bitcoins (equivalent to JPY 1.15
such as Work From has forgotten to
billion in value at the time) as a ransom in
Home update
exchange for the decryption and deletion of
Information leakage Attacks targeting
5th the stolen data.
due to internal fraud websites
Increased exploitation As the company refused to pay, the attackers
following the release Attacks targeting disclosed at least 100 gigabytes of the stolen
6th of vulnerability smartphones and data on the internet on three separate
countermeasure tablets occasions. As a result, the company suffered a
information major information leakage incident.
Attacks targeting
Conventional ransomware
before the release of a Unexpected pitfalls in
7th
corrected program electronic certificates
Encryption of data & systems
(zero-day attacks)
Financial damage
Internal crimes and
8th caused by business
information leaks
email fraud
Business suspension
9th due to unforeseen IT Reuse of accounts
infrastructure failures
Damage caused by Recent ransomware
Improper handling of
10th carelessness Encryption of data Disclosure of confidential
user information.
information leaks, etc. & systems information

In the following sections, we introduce incident


cases related to “Damage caused by ransomware”,
“Attacks that exploit weaknesses in the supply
chain” and “Attacks targeting new-normal working
style such as Work From Home”, which are the top
threats in 2022. 3) Attacks exploiting supply chain weaknesses
A series of business processes from procurement
of raw materials and components,
2) Ransomware attacks manufacturing, inventory management,
Ransomware is a type of malicious software distribution and sales, as well as a group of
(malware) that aims to harm or exploit devices, organizations involved in this business process is
services and networks. It causes infected called a “supply chain”, and nowadays,
computers to become encrypted and restricts information systems are increasingly integrated
users’ access to their systems. In order to within the supply chain or mutually
remove this restriction, the hacker demands the interconnected by networks. Attacks that are
victim to pay a ransom. More recently, in exploiting this relationship to target suppliers
addition to encrypting the target, a “double with weak security, leak confidential information
threat” type of attack has become more of the original target company, or use the
common, in which confidential information is suppliers as a foothold to launch attacks on the
stolen and threatened with exposure. original target company are on the rise.
-2- @ Tokio Marine Asia Pte. Ltd. All Rights Reserved
TM-RE News Issue No. 27 | November 2022

[Actual Case 2] Theft or loss of devices for WFH


Company B has been a primary trading partner Virus infection of devices for WFH
of major automobile manufacturer Company C Internal System

since the company was founded, thus its


system for ordering and receiving parts was
directly linked to Company C, despite the
company's small size. Shoulder
Unauthorized hacking hacking
In 2022, Company B's internal server failed, and Source: IPA
when the server was restarted, a threatening [Actual Case 3]
message “the information would be disclosed In 2020, a major Japanese manufacturing
unless this link was accessed” appeared on the Company D was infected with a virus when an
screen in English. Therefore Company B shut employee working from home using company-
down its network with its business partners. In owned computer connected to an external
response to this situation, Company C shut network without going through the internal
down its order and supply system, resulting in network, and used a social networking service.
the suspension of automobile production at all Subsequently, the employee connected the PC
to the internal network when he worked at
14 plants in Japan.
work, and the virus infection spread to the
More efficient for attackers to attack smaller suppliers internal network.
In the same year, a vulnerability was found in
the web conferencing service, which allowed
Large access to private online meetings. The default
Scale
Ordering/Receiving password used to access online meetings is a
System Automobile manufacturers six-digit number, which would result in a
and Major primary suppliers
Size of company

million attempts to log in. Therefore, the


vendor had set a limit on the number of
attempts to enforce the password, but by using
a specific access method, the password
enforcement limit could be circumvented. The
vulnerability has now been resolved.
Small primary suppliers
and secondary and
Small tertiary suppliers 3. Measures required by companies
Scale

■ Common Countermeasures
Level of Countermeasures
Low High
Common countermeasures against cyber-attacks are
similar to general information security measures.
4) Attackers targeting vulnerabilities in telework They can be broadly divided into countermeasures
environments against human errors and mechanical errors.
With the global spread of novel coronavirus ❑ Countermeasures against human errors
infections, “Work From Home (WFH)”, the use of This includes regular education and training of
ICT (Information and Communication Technology) information system users to prevent them from
to work away from the office, has become opening suspicious emails. For this purpose, it
widespread around the world. Opportunities to is effective to educate them which sites they
access company systems from home via VPNs should not access and how to identify
(virtual private networks) and to hold meetings suspicious emails they should not open files
with their own or other organizations using web from. It is also necessary to inform them that
conferencing services have increased, however they must voluntarily report to the information
systems department etc., in the event that
the use of personal computers and home
they do access or open an infected file.
networks and the hasty introduction of first-time
software without adequate preparation have There are two types of training, training for
made the work environment vulnerable. This led individuals and training for the organization as
a whole. For individuals, the training is called
to vulnerabilities in the work environment and an
“phishing email training”, in which dummy
increase in incidents such as unauthorized access
suspicious emails are sent to each employee, and
to internal systems, peeping into web conferencing if they open the file, they are instructed that “you
and PCs for WHF being infected by viruses. have accidentally opened a targeted email...”.
-3- @ Tokio Marine Asia Pte. Ltd. All Rights Reserved
TM-RE News Issue No. 27 | November 2022

For Organizations, they are required to be ❑ Countermeasures against attacks that exploit
trained in procedures for responding to supply chain weaknesses
incidents such as information leaks (detection It is effective to establish an information
and reporting), decisions on setting up task sharing system among supply chains. Firstly,
forces, whether forensics should be carried out identify organizations that share the same
or not, public relations responses, etc.). information systems so that the impact of an
incident can be quickly ascertained in the
[Example] Suspicious emails used in event of the incident. Moreover, if a software
targeted email training
used by other organizations or linked to their
Subject Virus infection detected information systems becomes infected with a
“Information Security”
virus or receives unauthorized access, a system
From
<isecalert325@gmail.com> should be established to promptly share this
➢ Free email account information with all organizations using the
software.
For users of terminal number PX215456D
➢ Fictitious ID ❑ Countermeasures against attacks targeting
A virus infection has been detected on a PC used by you in vulnerabilities in remote work environments
our terminal monitoring system. It is effective to establish an information sharing
There is still a risk that personal and confidential system between supply chains. Identifying
information may have leaked. organizations that share the same information
systems so that the impact of an incident can be
In order to prevent the damage from spreading, please take
immediate action according to the linked procedure. quickly ascertained when it occurs.

Security Lab. ➢ Promote to click the link URL


If a software that is also used by other
organizations or linked to other organizations’
➢ Non-existing Department information systems is infected by a virus or
➢ Does not match the sender address.
illegally accessed, establish a system to
promptly share this fact with all organizations
❑ Countermeasures against mechanical errors using the software.
Keeping the operating system and software up-
▪ When Working From Home
to-date (version) and eliminating vulnerabilities
reduces the risk of infection. In addition, the risk For home routers, check the manufacturer's
of infection with ransomware should be reduced website and apply the latest firmware (software
by installing security software that keeps update).
programs up-to-date and by keeping programs ▪ When working at public places
up-to-date.
When using a computer or other device in a
public place such as a café, take care not to be
■ Measures based on the aspect of the attack peeped the computer screen. When conducting
❑ Countermeasures against ransomware attacks web conferencing in public places, make sure
When infected with file-encrypting that others cannot hear you talking.
ransomware, decrypting encrypted files is ▪ When using public Wi-Fi
difficult. Therefore, it is necessary to make
The best practice is to prohibit the use of
backups of important files that would have a
public Wi-Fi. If you really need to use it
significant impact in case of lost. If a backup is
urgently, turn off the file sharing function on
saved, it will enable to restore the files from
your computer and use a reliable VPN service
the backup in the event that they are infected
where possible.
by ransomware and encrypted.

Published By: [Contact]


Risk Engineering Department
Email: TMA_RE@tokiomarineasia.com

Disclaimer: The information, suggestions, and recommendations contained herein are for general informational purposes only.
This information has been compiled from sources believed to be reliable. No warranty, guarantee, or representation, either
expressed or implied, is made as to the correctness or sufficiency of any representation contained herein.
Writer: Mr. Kenji Aoshima, General Head Consultant, Risk Management Dept., Tokio Marine dR Co., Ltd.
-4-
-4- @ Tokio Marine Asia Pte. Ltd. All Rights Reserved

You might also like