2. How Can Government Agencies Protect Themselves?
While the basics of strong cyber hygiene still apply, the FBI says these tactics are especially crucial in the face of dual attacks: network segmentation (to limit the spread of ransomware), patching (to close vulnerabilities) and the principle of least privilege (to limit admin access to the bare minimum).
3. What Are Unique Considerations for State and Local Agencies?
Dual ransomware attacks present a heightened risk to governments due to the sensitive nature of data and services that they handle. Attacks halting operations such as permitting, tax collection and emergency response endanger the public and undermine trust in government. Encryption is a must. The FBI warns of attackers stealing data as leverage, and exposing citizen information would be a nightmare scenario.
READ MORE: Governments increase email security to defeat phishing.
4. What Are the Hidden Costs of Ransomware Attacks?
Dual ransomware attacks can inflict lasting damage that goes far beyond ransom payments. When systems grind to a halt, services stop and government operations are paralyzed. This has direct financial and public services consequences, the FBI warns. The agency even mentions new "data wiper" malware designed for maximum disruption. These attacks strain IT teams and crush morale across organizations.
5. What Else Does the FBI Say About Dual Ransomware Attacks?
The FBI warns that attackers have added code to known data theft tools to escape detection. Also, malware containing data wipers may sit dormant for a calculated period of time. The FBI advises state and local agencies to maintain offline data backups and to encrypt them while monitoring for suspicious activity.