After a hack, loose lips won’t sink chips
Ion Group is the latest ransomware victim to stay mum about how it was compromised. No-one benefits from this code of silence
When a company falls prey to a cyber attack, the standard response is often to clam up, say as little as possible – at least publicly – and work behind the scenes to clean up the mess.
This is the playbook Ion Group, a supplier of trading and risk management software to financial firms, followed when its servers became infected with ransomware at the end of January. After the affected services were taken offline, it took hours for some clients to confirm the cause of the outage. The lack of information frustrated customers and regulators alike and stoked fears of systemic risk.
Ion’s only public statement on the matter was a three-sentence notice posted on its website later that day confirming some of its servers had been disconnected following a cyber attack. “Further updates will be posted when available,” the note added. They weren’t.
The vacuum of information – and accountability – that typically follows a hack only feeds the problem
When the financial press began reporting on the outage on February 1, it was the US Department of the Treasury’s Office of Cybersecurity and Critical Infrastructure Protection that contacted journalists to assure them the situation was under control.
Ion’s communication remained limited in the days that followed. The firm held daily video calls with clients but as of last week had not revealed how the hackers infiltrated its systems, what vulnerability they exploited, or whether it paid a ransom to prevent the release of stolen data. A forensic report by CrowdStrike, the cyber security firm Ion hired to investigate the attack, is expected to be kept under wraps.
This is par for the course. Companies that fall victim to hackers often try to hide the details, either out of embarrassment or to shield themselves from legal exposure. Lawyers almost always advise clients not to release information about a cyber attack beyond what is strictly required by law. Some cyber professionals also favour secrecy, preaching the doctrine of security through obscurity, best encapsulated by the World War II military slogan, ‘loose lips sink ships’. The argument is that describing security failures makes companies more of a target for would-be attackers.
This feels wrong-headed. The vacuum of information – and accountability – that typically follows a hack only feeds the problem, making it harder for future targets to understand their vulnerabilities and craft better defences, while ensuring each fresh attack triggers the sort of chaos and confusion that benefits the hackers.
For all the mystery and intrigue surrounding the Ion incident, the firm’s clients and other sources who were involved in the episode believe this was a garden-variety ransomware attack. The hackers likely obtained access to Ion’s systems through a phishing attack, which is how the vast majority of breaches begin. Once in the network, they exploited a vulnerability in Ion’s virtualisation servers – a security flaw in VMware’s ESXi software, according to one of Ion’s clients, who claims to have the information from a contact within the vendor.
This was a known vulnerability and VMware had already issued a patch for it. Even so, cyber security authorities in France and Italy reported thousands of ransomware attacks on ESXi servers that week. Ion has not confirmed if it was among those targeted in this wave of attacks.
After locking up Ion’s systems, the hackers issued a ransom demand, which they claim was paid. Ion has not commented on the ransom. Many of the sources Risk.net spoke with suspect a payment was made at arm’s length, via a third party. The rumour among Ion’s employees is that the figure was in the region of $5 million.
Again, this is not out of the ordinary. When Colonial Pipeline, which operates the largest refined oil pipeline in the US, suffered a ransomware attack in 2021, it paid $4.4 million for a decryption key to unlock its systems. Cybersecurity experts say hackers usually settle for a fraction – 20-40% is typical – of their initial demands.
Disclosing this sort of information after a cyber attack should not be taboo. An executive at one fintech thinks full disclosure could even be an opportunity for firms such as Ion to change the narrative: “They have got caught with their pants down. It’s clear what most likely happened and they need to turn this into an education moment. This is a way they can restore reputation, stop the rot, and inform the community of the realities of ransomware, the costs and the importance of security standards and documentation.”
コンテンツを印刷またはコピーできるのは、有料の購読契約を結んでいるユーザー、または法人購読契約の一員であるユーザーのみです。
これらのオプションやその他の購読特典を利用するには、info@risk.net にお問い合わせいただくか、こちらの購読オプションをご覧ください: http://subscriptions.risk.net/subscribe
現在、このコンテンツを印刷することはできません。詳しくはinfo@risk.netまでお問い合わせください。
現在、このコンテンツをコピーすることはできません。詳しくはinfo@risk.netまでお問い合わせください。
Copyright インフォプロ・デジタル・リミテッド.無断複写・転載を禁じます。
当社の利用規約、https://www.infopro-digital.com/terms-and-conditions/subscriptions/(ポイント2.4)に記載されているように、印刷は1部のみです。
追加の権利を購入したい場合は、info@risk.netまで電子メールでご連絡ください。
Copyright インフォプロ・デジタル・リミテッド.無断複写・転載を禁じます。
このコンテンツは、当社の記事ツールを使用して共有することができます。当社の利用規約、https://www.infopro-digital.com/terms-and-conditions/subscriptions/(第2.4項)に概説されているように、認定ユーザーは、個人的な使用のために資料のコピーを1部のみ作成することができます。また、2.5項の制限にも従わなければなりません。
追加権利の購入をご希望の場合は、info@risk.netまで電子メールでご連絡ください。
詳細はこちら 我々の見解
パッシブ投資とビッグテック:相性の悪い組み合わせ
トラッカーファンドがアクティブ運用会社を締め出し、ごく少数の株式に対して過熱した評価をもたらしています。
粘着性のあるインフレに対する懸念がくすぶり続けている
Risk.netの調査によると、投資家たちはインフレの終息を宣言する準備がまだ整っていないことが判明しましたが、それには十分な理由があります。
トランプ流の世界がトレンドにとって良い理由
トランプ氏の政策転換はリターンに打撃を与えました。しかし、彼を大統領の座に押し上げた勢力が、この投資戦略を再び活性化させる可能性があります。
Roll over, SRTs: Regulators fret over capital relief trades
Banks will have to balance the appeal of capital relief against the risk of a market shutdown
オムニバス(法案)の下に投げる:GARはEUの環境規制後退を乗り切れるのか?
停止措置でEU主要銀行の90%が報告を放棄で、グリーンファイナンス指標が宙ぶらりんな状態に
コリンズ修正条項はエンドゲームを迎えたのでしょうか?
スコット・ベッセント氏は、デュアル・キャピタル・スタックを終わらせたいと考えています。それが実際にどのように機能するかは、まだ不明です。
トーキング・ヘッズ2025:トランプ氏の大きな美しい債券を購入するのは誰でしょうか?
国債発行とヘッジファンドのリスクが、マクロ経済の重鎮たちを悩ませています。
AIの説明可能性に関する障壁は低くなってきている
改良され、使いやすいツールは、複雑なモデルを素早く理解するのに役立ちます。