Page 47 - the SyI Quarterly 11
P. 47

Cyber  Updates












 Thames Tideway






 cyber-attack exercise







 Following an increase in global ransomware attacks   individuals belonging to an organisation can use
 and the UK National Cyber Security Centre’s warnings   their knowledge of the organisation’s security and
 of hostile actors targeting infrastructure providers,   information practices to orchestrate or develop the
 Tideway decided to gauge its preparedness for such   cyber-attack.
 an event. In November 2019, in collaboration with
 London Resilience Group, Tideway conducted a   The shock and confusion among staff was clear.
 crisis-management exercise aimed to test, validate   The information systems department was soon
 and provide opportunities to develop Tideway’s   overwhelmed and just as shocked by the speed of
 cyber-security defence capabilities. The ransomware   the initial attack. Crisis-management teams were
 scenario was a hybrid minimal-notice exercise.  subsequently able to use structured processes to
 understand the situation, agree priorities and set a
 Meticulous planning ensured that any associated   strategic direction.   W
 risks were mitigated to minimise disruption to the
 business. A Tideway service provider for threat   The key learning themes identified were that the
 monitoring (ThreatSpike Labs) supported the delivery   business had limited understanding of a ransomware
 of this exercise, using its software to target individual   attack and its impact on systems and business
 employees and generate fake ransomware, thus   continuity. The true impact, financial cost and
 replicating a real-time cyber-attack. The scenario   recovery timescales of such an attack were also
 started with a “spear-phishing” campaign, with   misunderstood. The exercise drove discussions
 targeted emails sent to individuals. This was delivered   on disclosure, how the ransom request should be
 by procuring a domain name that closely matched   handled, and which partner agencies to involve.
 the Tideway email address that was used to send   Colleagues from UK Central Government and the
 health and safety alerts.  Metropolitan Police Service’s Cyber Crime Unit also
 observed the exercise and were able to provide
 Once the email and attachment were opened,   valuable feedback and advice based on real incidents.
 ThreatSpike used a pre-agreed employee list to
 deny staff access to the network by “blue-screening”   Although organisations can never fully protect
 their laptops. As more members of staff opened   themselves against cyber-crime, Tideway’s
 the email, confusion and panic set in. Information   commitment to enhancing staff awareness with
 display screens housed on the fifth and sixth floors   the existence of robust and practised procedures
 of the headquarters building began to display a   ensures that the organisation is in the best position
 ransomware message demanding £15 million in   to respond to cyber-attacks.
 Bitcoin in return for releasing Tideway systems.
 The exercise demonstrated that shared
 After the initial spear-phishing element, the   understanding and organisational preparedness for
 ransomware injection provided a focus on the very   such incidents is vital in reducing the recovery time.
 real threat that organisations face. To improve
 organisational learning, the ransomware attack was    - Charles Frank CSyP MSyI
 combined with an “insider threat”, a less understood
 risk closely associated with cyber-crime, where


 46
   42   43   44   45   46   47   48   49   50   51   52