{"id":729,"date":"2024-10-04T16:44:09","date_gmt":"2024-10-04T22:44:09","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=729"},"modified":"2024-10-04T19:56:13","modified_gmt":"2024-10-05T01:56:13","slug":"indigo-ransomware-attack-a-comprehensive-ayalysis","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/04\/indigo-ransomware-attack-a-comprehensive-ayalysis\/","title":{"rendered":"Indigo Ransomware Attack A Comprehensive Ayalysis"},"content":{"rendered":"\n<p class=\"has-dark-gray-color has-text-color has-link-color wp-elements-f05f12094cd802ee45704d78589c2f83\"><strong>OVERVIEW<\/strong> On 8th February 2023, Canada\u2019s largest book retailer Indigo Books &amp; Music Inc. suffered a ransomware incident that shut down its whole business. At store point of sale systems and e-commerce systems were infected and had to shut down and stop their entire systems to contain the spread of the attack. The Attacker was able to access employees\u2019 data including social insurance numbers. Management immediately reacted by engaging with cybersecurity experts and Canadian police services and communicating with stakeholders promptly. The restoration of services was gradual, as in-store operations resumed within days, and the website was partially back online by Feb. 28, while e-commerce abilities were back on March 8 almost one month after the attack [1][2][3]<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"616\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/6500d27e5f55c.image_-1-1024x616.jpg\" alt=\"\" class=\"wp-image-737 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/6500d27e5f55c.image_-1-1024x616.jpg 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/6500d27e5f55c.image_-1-300x181.jpg 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/6500d27e5f55c.image_-1-768x462.jpg 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/6500d27e5f55c.image_-1.jpg 1200w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/616;\" \/><figcaption class=\"wp-element-caption\">[12]<\/figcaption><\/figure>\n\n\n\n<p><strong>Indigo Attack Techniques: <\/strong>It was confirmed that the attacker used LockBit ransomware to pass through Indigo&#8217;s network by one of several common methods: Unpatched vulnerabilities on public-facing services on systems being exploited, malicious attachments in phishing emails, or otherwise acquired compromised credentials via social engineering [2][6].<\/p>\n\n\n\n<p><strong>Indigo Response: <\/strong>Prioritized containment before restoration. First, they took all systems offline to stop the malware from spreading any further. Next, they hired cybersecurity experts to dig for the root cause of the breach and start cleaning up. At first, the Inigo returned to in-store limited operations with cash-only transactions. Then, they partially restored the website with limited functionality, and later time the e-commerce capabilities were restored to normal. During the process Indigo continually communicated transparently with Stakeholders, reporting on the situation and recovery progress as it happened[1][10].<\/p>\n\n\n\n<p><strong>Potential Network Vulnerabilities: <\/strong>The ransomware attack uncovered several of Indigo&#8217;s network infrastructure weaknesses. The attack might have been the result of insufficient network segmentation, a lack of robust access controls and privilege management, a lack of robust endpoint detection and response solutions, and possibly outdated, unpatched systems on the internet-facing infrastructure. Phishing still was an option, and likely also some employee cybersecurity awareness issues [2][6][7].<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"612\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM-1024x612.png\" alt=\"\" class=\"wp-image-732 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM-1024x612.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM-300x179.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM-768x459.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM-1536x918.png 1536w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM-1568x938.png 1568w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-3.20.00-PM.png 1669w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/612;\" \/><figcaption class=\"wp-element-caption\">[11]<\/figcaption><\/figure>\n\n\n\n<p><strong>Losses and Mitigation:<\/strong> The attack economically affected both e-commerce and store operations, which led to a significant drop in revenue [8]. Moreover, that would bring potential reputational damage and loss of customer trust[4]. Indigo confirmed that no customers&#8217; sensitive data including credit card information were compromised[5]. The social insurance numbers (SIN) of employees were breached, however. To mitigate the effect of this data breach, Indigo offered affected employees 2 years of credit monitoring by TransUnion Canada at no charge [3]. Indigo decided to not pay the ransom and spent almost a month restoring all systems to full functionality [1].<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"659\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-2.28.24-PM-1024x659.png\" alt=\"\" class=\"wp-image-731 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-2.28.24-PM-1024x659.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-2.28.24-PM-300x193.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-2.28.24-PM-768x494.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/Screen-Shot-2024-10-04-at-2.28.24-PM.png 1446w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/659;\" \/><figcaption class=\"wp-element-caption\">[9]<\/figcaption><\/figure>\n\n\n\n<p><strong>Security Recommendations<\/strong> [2][6][7]<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implement strong network segmentation layers that contain lateral movement at the time of attack.<\/li>\n\n\n\n<li>Users and systems must be enforced with the least privilege.<\/li>\n\n\n\n<li>Multi-factor authentication (MFA) for all critical systems including VPN access should be implemented.<\/li>\n\n\n\n<li>Patching schedule for all systems and especially for the internet-facing systems.<\/li>\n\n\n\n<li>Employees should receive regular security awareness training including phishing scenario simulation.<\/li>\n\n\n\n<li>Install an advanced Endpoint Detection and Response solution.<\/li>\n\n\n\n<li>Implement a strong and tested offline Data backup and recovery plan.<\/li>\n\n\n\n<li>Deploy a proper incident response plan that is tested regularly.<\/li>\n\n\n\n<li>Organizations must be prepared for zero-day vulnerabilities to mitigate zero-day exploits.<\/li>\n\n\n\n<li>Adopting a zero-trust security model (never trust, always verify).<\/li>\n<\/ul>\n\n\n\n<p><strong>Conclusion: <\/strong>Finally, organizations of all sizes must be able to understand and respond effectively to Indigo attacks. Organizations can boost their capability to avoid the effects of such attacks, and safeguard their operations, through a balanced implementation of the measures described in this blog.<br>A key defense strategy contains an incident response team, a comprehensive incident response plan, and regular testing and refining of the plan. Another important factor in how to react effectively to Indigo attacks is improving network visibility through advanced threat detection tools and making relationships with external resources [6][7].<\/p>\n\n\n\n<p><strong>Reference:<\/strong><\/p>\n\n\n\n<p>[1] CTV News. (2023, March 14). <em>Timeline of the ransomware attack against Canadian bookstore retailer Indigo<\/em>. CTV News. Retrieved October 1, 2024, from <a href=\"https:\/\/www.ctvnews.ca\/business\/timeline-of-the-ransomware-attack-against-canadian-bookstore-retailer-indigo-1.6304258\">https:\/\/www.ctvnews.ca\/business\/timeline-of-the-ransomware-attack-against-canadian-bookstore-retailer-indigo-1.6304258<\/a><\/p>\n\n\n\n<p>[2] SecureOps. (n.d.). <em>The Indigo Bookstore ransom cyber attack \u2013 Lessons learned<\/em>. SecureOps. Retrieved October 1, 2024, from <a href=\"https:\/\/secureops.com\/blog\/indigo-attack\/\">https:\/\/secureops.com\/blog\/indigo-attack\/<\/a><\/p>\n\n\n\n<p>[3] Seglins, D. (2023, March 10). <em>Indigo employees&#8217; data breached in ransomware attack<\/em>. CTV News. Retrieved October 1, 2024, from <a href=\"https:\/\/www.ctvnews.ca\/business\/indigo-employees-data-breached-in-ransomware-attack-1.6288045\">https:\/\/www.ctvnews.ca\/business\/indigo-employees-data-breached-in-ransomware-attack-1.6288045<\/a><\/p>\n\n\n\n<p>[4] Seglins, D. (2023, February 24). <em>Indigo risks reputational damage as outage drags on: Experts<\/em>. CTV News. Retrieved October 1, 2024, from <a href=\"https:\/\/www.ctvnews.ca\/business\/indigo-risks-reputational-damage-as-outage-drags-on-experts-1.6275475\">https:\/\/www.ctvnews.ca\/business\/indigo-risks-reputational-damage-as-outage-drags-on-experts-1.6275475<\/a><\/p>\n\n\n\n<p>[5] CTV News. (2023, February 17). <em>No customer payment information compromised after breach, Indigo says<\/em>. CTV News. Retrieved October 1, 2024, from <a href=\"https:\/\/www.ctvnews.ca\/business\/no-customer-payment-information-compromised-after-breach-indigo-says-1.6273803\">https:\/\/www.ctvnews.ca\/business\/no-customer-payment-information-compromised-after-breach-indigo-says-1.6273803<\/a><\/p>\n\n\n\n<p>[6] Government of Canada. (n.d.). <em>Ransomware: How to prevent and recover<\/em>. Canadian Centre for Cyber Security. Retrieved October 2, 2024, from <a href=\"https:\/\/www.cyber.gc.ca\/en\/guidance\/ransomware-how-prevent-and-recover-itsap00099\">https:\/\/www.cyber.gc.ca\/en\/guidance\/ransomware-how-prevent-and-recover-itsap00099<\/a><\/p>\n\n\n\n<p>[7] UpGuard. (2023, February 17). <em>Best practices to prevent ransomware attacks<\/em>. UpGuard. Retrieved October 2, 2024, from <a href=\"https:\/\/www.upguard.com\/blog\/best-practices-to-prevent-ransomware-attacks\">https:\/\/www.upguard.com\/blog\/best-practices-to-prevent-ransomware-attacks<\/a><\/p>\n\n\n\n<p>[8] Solomon, H. (2023, June 28). <em>Indigo ransomware attack cost millions, company says<\/em>. IT World Canada. Retrieved October 1, 2024, from <a href=\"https:\/\/www.itworldcanada.com\/article\/indigo-ransomware-attack-cost-millions-company-says\/541885\">https:\/\/www.itworldcanada.com\/article\/indigo-ransomware-attack-cost-millions-company-says\/541885<\/a><\/p>\n\n\n\n<p>[9] Beattie, S. (2023, April 24). <em>The Indigo cyberattack is a warning of things to come<\/em>. The Walrus. Retrieved October 1, 2024, from <a href=\"https:\/\/thewalrus.ca\/indigo-cyber-attack\/\">https:\/\/thewalrus.ca\/indigo-cyber-attack\/<\/a><\/p>\n\n\n\n<p>[10] CBC News. (2023, February 23). <em>Ransomware attack against Indigo leads to release of employee data on the dark web<\/em>. CBC News. Retrieved October 1, 2024, from <a href=\"https:\/\/www.cbc.ca\/news\/business\/ransomware-indigo-data-release-1.6766328\">https:\/\/www.cbc.ca\/news\/business\/ransomware-indigo-data-release-1.6766328<\/a><\/p>\n\n\n\n<p>[11] Adriano, L. (2023, February 24). <em>Canadian bookstore Indigo confirms recent cyberattack involved ransomware<\/em>. Insurance Business Canada. Retrieved October 1, 2024, from <a href=\"https:\/\/www.insurancebusinessmag.com\/ca\/news\/cyber\/canadian-bookstore-indigo-confirms-recent-cyberattack-involved-ransomware-437501.aspx\">https:\/\/www.insurancebusinessmag.com\/ca\/news\/cyber\/canadian-bookstore-indigo-confirms-recent-cyberattack-involved-ransomware-437501.aspx<\/a><\/p>\n\n\n\n<p>[12] McLaren, L. (2023, October 3). <em>Did Indigo fail books, or was it the other way around?<\/em> The Toronto Star. <a href=\"https:\/\/www.thestar.com\/opinion\/star-columnists\/did-indigo-fail-books-or-was-it-the-other-way-round\/article_bb841eb0-18da-571e-b156-a311130bf4aa.html\">https:\/\/www.thestar.com\/opinion\/star-columnists\/did-indigo-fail-books-or-was-it-the-other-way-round\/article_bb841eb0-18da-571e-b156-a311130bf4aa.html<\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>OVERVIEW On 8th February 2023, Canada\u2019s largest book retailer Indigo Books &amp; Music Inc. suffered a ransomware incident that shut down its whole business. At store point of sale systems and e-commerce systems were infected and had to shut down and stop their entire systems to contain the spread of the attack. The Attacker was &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/04\/indigo-ransomware-attack-a-comprehensive-ayalysis\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Indigo Ransomware Attack A Comprehensive Ayalysis&#8221;<\/span><\/a><\/p>\n","protected":false},"author":691,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-729","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Firas Shama","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/firas-shama\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/691"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=729"}],"version-history":[{"count":2,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/729\/revisions"}],"predecessor-version":[{"id":754,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/729\/revisions\/754"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}