Are you using the right vendor remote access tool? Lessons from the Texas mass ransomware attack

September 19, 2019//Tony Howlett

Last Updated: October 02, 2019

New developments were revealed in the mass ransomware attack that took down operations at 22 small Texas cities. The attackers coordinated the timing of the malware launch to hit all of the victims at once, thereby swamping the available digital first responders. It was previously reported that the attack originated in a Managed Service Provider (MSP) that the victim cities all had in common: RSM Consulting out of Rockwall, Texas. Based on new reporting done by CRN, the MSP was using the ConnectWise Control tool to support their clients and apparently the hackers were able to coopt the tool to exploit their clients. 

Here are my thoughts on these attacks:

  • It’s not surprising that the hackers were able to take over a poorly secured tool and use it to spread their malware. Hackers know these platforms are used to support massive customer populations and go after them because they are huge providers with lots of published exploits. It’s simply an easy kill zone for hackers. 
  • These broad-spectrum remote management systems might be fine for providing generic desktop support in an unregulated environment, but for critical infrastructure (like utility bills, real estate records and more) that’s not the case. For compliance sensitive organizations such as law enforcement or credit card merchants, they simply aren’t enough. 
  • There’s probably plenty of blame to go around in this case, from ConnectWise, to the MSP, to the customers themselves. The customer did not choose to implement multi-factor authentication which would have likely stopped the attack in its tracks. However, the software vendor should have made it mandatory or fully explained the risks of not using MFA, especially in environments like law enforcement where the CJIS standard requires it for admin accounts. 
  • It has yet to be explained how the hackers got the credentials for the systems, but I’m willing to bet that the MSP might have some fault in that. They implemented the tool and had the admin credentials to it, so all paths lead through them to the eventual victims. 
  • I’d even go as far as to blame the cyber liability insurance companies. I would expect to see stricter underwriting standards and more outright rejection of claims when the claimant can be shown to have practice gross negligence in their security protocols. 

Key takeaways

So, due to all these factors, there’s no silver bullet that will quell this ransomware epidemic overnight. Small governments are going to have to take a good, hard look at established practices such as using MSPs and their own internal policies and procedures. MSPs are going to have to batten down the hatches and properly protect their customers’ systems and networks. And software providers can no longer get away with saying “we told you so” when their software is implicated in a massive attack like these. 

How this may have been stopped

An underlying issue with anyone using external vendors is that it opens up your network and systems to unwanted issueslike data breaches, lost data, and ransomware attacks. The best way to combat these well-known threats is to implement a program built for managing vendors’ access. Advanced technologies, such as vendor privileged access management (VPAM), will fully secure vendor accounts and their use. 

To learn more about how your vendor access management tools are putting your company at risk, check out our helpful brochure that highlights the importance of having a separate software platform specifically to manage vendors’ privileged access to systems, networks, and applications.

Leave a Comment

close close