Stay up to date with notifications from TheĀ Independent

Notifications can be managed in browser preferences.

Costa Rica chaos a warning that ransomware threat remains

Costa Rica has been reeling from unprecedented ransomware attacks disrupting everyday life in the Central American nation for the last two months

Via AP news wire
Friday 17 June 2022 00:26 EDT
Ransomware Targeting Nations
Ransomware Targeting Nations (Copyright 2022 The Associated Press. All rights reserved.)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Teachers unable to get paychecks. Tax and customs systems paralyzed. Health officials unable to access medical records or track the spread of COVID-19. A countryā€™s president declaring war against foreign hackers saying they want to overthrow the government.

For two months now, Costa Rica has been reeling from unprecedented ransomware attacks disrupting everyday life in the Central American nation. It's a situation raising questions about the United States' role in protecting friendly nations from cyberattacks at a time when Russian-based criminal gangs are targeting less developed countries in ways that could have major global repercussions.

ā€œToday itā€™s Costa Rica. Tomorrow it could be the Panama Canal,ā€ said Belisario Contreras, former manager of the cybersecurity program at the Organization of American States, referring to a major Central American shipping lane that carries a large amount of U.S. import and export traffic.

Last year, cybercriminals launched ransomware attacks in the U.S. that forced the shutdown of an oil pipeline that supplies the East Coast, halted production of the worldā€™s largest meat-processing company and compromised a major software-company that has thousands of customers around the world.

The Biden administration responded with a whole of government action that included included diplomatic, law enforcement, and intelligence efforts designed to put pressure on ransomware operators.

Since then, ransomware gangs have shied away from ā€œbig-gameā€ targets in the U.S. in pursuit of victims unlikely to provoke a strong response by the U.S.

ā€œTheyā€™re still prolific, theyā€™re making enormous amounts of money, but theyā€™re just not in the news everyday,ā€ Eleanor Fairford, a deputy director at the UKā€™s National Cyber Security Centre, said at a recent U.S. conference on ransomware.

Tracking trends of ransomware attacks, in which criminals encrypt victims' data and demand payment to return them to normal, is difficult. NCC Group, a UK cybersecurity firm that tracks ransomware attacks, said the number of ransomware incidents per month so far this year has been higher than it was in 2021. The company noted that the ransomware group CL0P, which has aggressively targeted schools and health care organizations, returned to work after effectively shutting down for several months.

But Rob Joyce, the director of cybersecurity at the National Security Agency, has said publicly that there's been a decrease in the number of ransomware attacks since Russia's invasion of Ukraine thanks to increased heightened concerns of cyberattacks and new sanctions that make it harder for Russian-based criminals to move money.

The ransomware gang known as Conti launched the first attack against the Costa Rican government in April and has demanded a $20 million payout, prompting the newly installed President Chaves Robles to declare a state of emergency as the tax and customs offices, utilities and other services were taken offline. ā€œWeā€™re at war and this is not an exaggeration,ā€ he said.

Later, a second attack, attributed to a group known as Hive knocked out the public health service and other systems. Information about individual prescriptions are offline and some workers have gone weeks without their paycheck. Itā€™s caused significant hardship for people like 33-year-old teacher Alvaro Fallas.

ā€œI live with my parents and brother and they are depending on me,ā€ he said.

In Peru, Conti has also attacked the countryā€™s intelligence agency. The gangā€™s darkweb extortion site posts purportedly stolen documents with the agencyā€™s information, like one document market ā€œsecretā€ that details coca-eradication efforts.

Experts believe developing countries like Costa Rica and Peru will remain particularly ripe targets. These countries have invested in digitizing their economy and systems but donā€™t have as sophisticated defenses as wealthier nations .

Costa Rica has been a longtime stable force in a region often known for upheaval. It has a long established democratic tradition and well-run government services.

Paul Rosenzweig, a former top DHS official and cyber consultant who is now a legal resident of Costa Rica, said the country presents a test case for what exactly the U.S. government owes its friendly and allied governments who fall victim to disruptive ransomware attacks. While an attack on a foreign country may not have any direct impact on U.S. interests, the federal government still has a strong interest in limiting the ways in which ransomware criminals can disrupt the global digital economy, he said.

ā€œCosta Rica is a perfectly good example because itā€™s the first,ā€ Rosenzweig said. ā€œNobody has seen a government under assault before.ā€

So far, the Biden administration has said little publicly about the situation in Costa Rica. The U.S. has provided some technical assistance through its Cybersecurity and Infrastructure Security Agency, via an information-sharing program with nations around the world. And the State Department has offered a reward for the arrest of members of Conti.

Eric Goldstein, the executive assistant director for cybersecurity at CISA, said Costa Rica has a computer emergency response team that had an established relationship with counterparts in the U.S. before the incidents. But his agency is expanding its international presence by establishing its first overseas attache position in the U.K. It plans others in as-yet unspecified locations.

ā€œIf we think about our role, CISA and the US government, it is intrinsically of course to protect American organizations. But we know intuitively that the same threat actors are using the same vulnerabilities to target victims around the world," he said.

Conti is one of the more prolific ransomware gangs currently operation and has hit over 1,000 targets and received more than $150 million in payouts in the last two years, per FBI estimates.

At the start of invasion of Ukraine, some of Contiā€™s members pledged on the groupā€™s dark web site to ā€œuse all our possible resources to strike back at the critical infrastructures of an enemyā€ if Russia was attacked. Shortly afterward, sensitive chat logs that appear to belong to the gang were leaked online, some of which appeared to show ties between the gang and the Russian government.

Some cyber threat researchers say Conti may be in the middle of a rebranding, and its attack on Costa Rica may be a publicity stunt to provide a plausible story for the groupā€™s demise. Ransomware groups that receive lots of media attention often disappear, only for its members to pop back up later operating under a new name.

On its darkweb site, Conti has denied thatā€™s the case and continues to post victimsā€™ files. The gangā€™s most recent targets include a city parks department in Illinois, a manufacturing company in Oklahoma and food distributor in Chile.

___

AP writer Javier CĆ³rdoba contributed from San Jose, Costa Rica.

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in