At the beginning of May, a U.S. pipeline company suffered a ransomware attack. The company halted operations for several days, causing a spike in gas prices and localized fuel shortages. It also decided to meet the threat actors’ demands of $5 million, an ask emblematic of the rising costs of ransomware.

The U.S. Department of Justice (DOJ) is taking action in the wake of that attack, among others. As reported by Reuters, DOJ investigators will now begin looking into ransomware attacks with the same level of priority as they do with terrorism.

Read on to learn how this decision might affect the DOJ’s investigations into ransomware going forward.

A ‘Specialized Process’

On June 3, 2021, Reuters reported internal guidance sent within the DOJ and among U.S. attorneys’ offices. A new task force in Washington will now be responsible for centrally coordinating information about ransomware investigations.

John Carlin, DOJ’s principal associate deputy attorney general, said the U.S. government will now tackle the ransomware threat more holistically.

“It’s a specialized process to ensure we track all ransomware cases regardless of where it may be referred in this country, so you can make the connections between actors and work your way up to disrupt the whole chain,” he said.

To do that, the DOJ will expect U.S. attorneys’ offices to share ransomware case details and other technical information with leaders in Washington on an ongoing basis.

U.S. attorney investigators will also look into other instances of digital crime, including botnets and online money laundering services.

“We’ve used this model around terrorism before, but never with ransomware,” Carlin pointed out.

Over 100 Ransomware Strains Under FBI Scrutiny

A day after Reuters’ report, FBI Director Christopher Wray provided an update into the Bureau’s anti-efforts. The FBI will approach the ransomware threat as it did the challenges posed by the 9/11 terrorist attacks, he said.

“There are a lot of parallels; there’s a lot of importance and a lot of focus by us on disruption and prevention,” Wray told The Wall Street Journal. “There’s a shared responsibility, not just across government agencies but across the private sector and even the average American.”

Wray went on to reveal that the FBI is currently tracking over 100 different ransomware strains. Many of those trace back to gangs in Russia, he clarified.

How to Defend Against a Ransomware Attack

The DOJ’s shift in approach highlights the need for businesses and agencies to consider this a serious threat. Towards this end, organizations can follow best practices laid out by The White House, such as testing their incident response plans often. Doing so will help them to find gaps in their defenses.

Organizations should also consider segmenting their networks. This measure is essential for preventing an infection from affecting enterprise assets more widely. With network segmentation, data backup can be used to restore the affected segment — all while preserving at least some of their business functions.

If you have experienced a ransomware attack and would like immediate assistance from IBM Security X-Force incident response, please call our hotline at 1-888-241-9812 (US) or +001-312-212-8034 (Global). Learn more about X-Force’s threat intelligence and incident response services.

More from News

New Survey Shows Burnout May Lead to Attrition

For many organizations and the cybersecurity industry as a whole, improving retention and reducing the skills gap is a top priority. Mimecast’s The State of Ransomware Readiness 2022: Reducing the Personal and Business Cost points to another growing concern — burnout that leads to attrition. Without skilled employees, organizations cannot protect their data and infrastructure from increasing cybersecurity attacks. According to Mimecast’s report, 77% of cybersecurity leaders say the number of cyberattacks against their company has increased or stayed the…

Alleged FBI Database Breach Exposes Agents and InfraGard

Recently the feds suffered a big hack, not once, but twice. First, the FBI-run InfraGard program suffered a breach. InfraGard aims to strengthen partnerships with the private sector to share information about cyber and physical threats. That organization experienced a major breach in early December, according to a KrebsOnSecurity report. Allegedly, the InfraGard database — containing contact information of over 80,000 members — appeared up for sale on a cyber crime forum. Also, the hackers have reportedly been communicating with…

Google Ad Scam Makes Millions Using Fake Adult-Only Sites

An advertising fraud scheme that utilized Google Ads and “pop-unders” on adult websites generated estimated millions of ad impressions on stolen content. The campaign was reported by Malwarebytes on December 20, and the scam raked in an estimated $275,000 per month for the perpetrators. Alerted to the scam, Google shut down the fraudulent activity for violating the company’s policies prohibiting the use of Google Ads on adult sites. A pop-under is a type of advertisement that appears behind an open…

Third-Party Risk Contributes to Healthcare Data Breaches

Since 2009, the number of individuals affected by health data breaches in the U.S. has exceeded the country’s population of 331.9 million. As per federal statistics, this means many people have been victims of more than one incident. Unfortunately, the situation seems to be growing worse. In just the last three years, the volume and frequency of breaches have nearly doubled, from 368 in 2018 to 715 in 2021. And during the first half of 2022, the number of data…