A Breach in Boston: What's Happening When It's Quiet
May 31, 2019 — On May 1st, Charles River Labs announced a breach and reported that data had been copied out from approximately 1% of their clients. They worked with federal law enforcement and determined that “very sophisticated, well-resourced intruders were responsible for this incident” and that the intruders “have been independently targeting multiple organizations”.1
While that announcement certainly generates not only curiosity, but also concern for others within the industry, nothing has been released since, which leaves us several questions: What happened? Could it happen to us? What should we do? This quiet period after a breach is normal, as we’ve seen with others. It usually isn’t until a year or more later that the full study of the incident is released.
We don’t know the details of what this victim is going through during this time, but based on other companies’ breaches over the years, we can surmise the general process that they’re going through:
First, with a breach, certain reporting and notification are required. This means that the company has to inventory which data was compromised and create a list of all of the individuals whose protected information was affected. Depending on whether the data is structured (e.g. in databases) or unstructured (e.g. in documents and other office files), this can take a lot of time. Following that, there’s the process of notifying those individuals.
Second, with a sophisticated and well-resourced attacker, there are questions as to how the attacker was able to get into the network, and are they still there? This can result in ongoing forensics efforts with third parties to determine:
- how and when the attacker entered the network.
- how the attacker traversed the network and the extent that the attacker reached.
- what changes were made or tools were installed by the attacker to be able to get in again later.
It’s not uncommon for a victim to kick an attacker out of their network and clean up after them, only to have the attacker come right back in again. Several well-known companies offer Compromise Assessments, which involves installing agents on workstations and servers, and analyzing retrieved data for anomalous files and behaviors. While the forensics effort is taking place, there can also be quarantining and rebuilding of affected IT infrastructure (while still running the day to day business) and continued monitoring to detect any additional or previously unseen malicious behavior on the network.
Third, in addition to containing and eradicating the threat, the victim company will likely deploy increased security controls and also increase their visibility of their environment, to prevent this type of attack, and those like it, from happening again. This may be in the form of policy and process improvements, additional user training, or product or service acquisition. The goal at this point is to learn from the experience and get back to normal business, even stronger than before.
There isn’t much to read about the Charles River Labs breach today. Perhaps in the future there may be a case study or other presentation detailing the events and the attacker’s methods. Today, it’s important to realize that biotech firms are being targeting by sophisticated and well-resourced attackers aimed at stealing data, this industry’s greatest asset. This is a good time to make sure that your organization has a well thought-out security strategy with a complete, well-rounded security program and is dedicating sufficient resources and priority to it. It’s important to partner with the right vendors to provide expertise where it’s most needed, and also to audit and test the robustness of your security program. If we’ve learned anything from the history of breaches, it’s that they often result from a series of relatively small events, oversights, or process breakdowns, while seemingly insignificant on their own, left unnoticed and given time to percolate, can clearly erupt into catastrophe.
1 April 2019. Charles River Cybersecurity Incident Q&A for Clients.
Deciding between keeping IT security tasks in-house or relying on a partner with specialized expertise, can be compared to managing home improvement projects. There are many things you can try to repair using the Do-It-Yourself approach. If everything goes just right, you might save yourself some money, and hopefully, you’ve got time left over to relax. But what if everything goes wrong?
Take a moment and think about your company’s network as your home. In our houses, we go to great length to secure ourselves—doorknob locks, deadbolts, smart locks. Now look at your corporate network, how do you feel about the front door of your network? Does it give you the same sense of security that the front door of your home does? This is why we need network security.
Once ransomware is resident on a system, it can be a simple money collection exercise or a means to an end to capture intellectual property. Lost intellectual property may allow an organization in another country to leap forward and deliver your discoveries.