{"id":883,"date":"2024-10-23T16:31:04","date_gmt":"2024-10-23T22:31:04","guid":{"rendered":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/?p=883"},"modified":"2024-10-23T16:31:08","modified_gmt":"2024-10-23T22:31:08","slug":"calgary-public-librarys-cyber-attack","status":"publish","type":"post","link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/23\/calgary-public-librarys-cyber-attack\/","title":{"rendered":"Calgary Public Library\u2019s Cyber Attack"},"content":{"rendered":"\n<p><strong>What happened?<\/strong><\/p>\n\n\n\n<p>On Oct 11<sup>th<\/sup> 2024 all 22 locations of public libraries across Calgary was shut down amid a cyber-attack. The early news suspected it to be the ransomware attack endangering public\u2019s crucial data at the hands of attackers.<\/p>\n\n\n\n<p><strong>Why was library targeted?<\/strong><\/p>\n\n\n\n<p><em>&#8220;Libraries are a rich target, and the reason that they&#8217;re rich target is because they hold a lot of data,&#8221; <\/em>said Ritesh Kotak, a Toronto-based cybersecurity and technology analyst.<\/p>\n\n\n\n<p>The Public library contains crucial data of its users. At the time of getting the library card, a user is needed to provide sensitive data as in date of birth, address, full name and photo ID. From a hacker\u2019s point of view, it is an ideal platform to attack and demand ransom money.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1012\" height=\"643\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-10.png\" alt=\"\" class=\"wp-image-884 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-10.png 1012w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-10-300x191.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-10-768x488.png 768w\" data-sizes=\"(max-width: 1012px) 100vw, 1012px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1012px; --smush-placeholder-aspect-ratio: 1012\/643;\" \/><\/figure>\n\n\n\n<p>Since the beginning of Covid-19 the cyber attacks have gained more popularity as the paradigm of working has shifted to remote access\/cloud-based. However, the cyber extortion methods dates back to 1980s and the first ransomware attack took place in 1989 with the PC Cyborg Trojan.<\/p>\n\n\n\n<p>In today\u2019s evolving IT world, cyber security practices need to be more robust than ever before to save end users, clients and companies data from cyber-attacks and to mandate confidentiality, integrity and availability of data always.<\/p>\n\n\n\n<p>Since the Calgary Library\u2019s Ransomware attack is quite recent; the final report is yet to come, let\u2019s investigate the Ransomware and its categories to get a closer look at the situation.<\/p>\n\n\n\n<p>There are three types of Ransomware attack, locker, crypto, and scareware.<\/p>\n\n\n\n<p><strong>Scareware:<\/strong> It manipulates end user to click a pop-up ad that traps user into downloading a software in order to run a certain application. In the end, if the user clicks it ends up downloading a malware infecting the system.<\/p>\n\n\n\n<p><strong>Locker:<\/strong> The purpose of this type of ransomware is to block the user\u2019s computer. It is done by encrypting certain files which tends to lock the computer screen\/keyboard so that it cannot be accessed\/used.<\/p>\n\n\n\n<p><strong>Crypto ransomware:<\/strong> Unlike locker technique, it does not alter the basic computer functions but encrypts the user\u2019s sensitive files. It is an irreversible ransomware as current encryption methods such as AES and RSA are almost impossible to revert if the implementation is properly done.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"412\" data-src=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-11-1024x412.png\" alt=\"\" class=\"wp-image-885 lazyload\" data-srcset=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-11-1024x412.png 1024w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-11-300x121.png 300w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-11-768x309.png 768w, https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-content\/uploads\/sites\/119\/2024\/10\/image-11.png 1074w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/412;\" \/><\/figure>\n\n\n\n<p>There are three encryption schemes for Crypto Ransomware;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Symmetric:<\/strong> A purely symmetric approach is problematic as the encryption key must be embedded in the ransomware, this makes this approach vulnerable to reverse engineering.<\/li>\n\n\n\n<li><strong>Asymmetric:<\/strong> The issue with this approach is that asymmetric encryption is slow compared to symmetric encryption and hence struggles to encrypt larger files<\/li>\n\n\n\n<li><strong>Hybrid:<\/strong> The hardest to decrypt and the most effective method is hybrid encryption. It uses both symmetric and asymmetric encryption.<\/li>\n<\/ul>\n\n\n\n<p>How to mitigate Security threats and Ransomware attacks<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The unawareness about the use of internet, the scarcity of knowledge of ransomware techniques amongst the masses and an inadequate detection mechanism result in more frequent attack these days.<\/li>\n\n\n\n<li>Implementing strong network segmentation layers that contain lateral movement at the time of attack.<\/li>\n\n\n\n<li>Installing antivirus and firewalls to secure sensitive data.<\/li>\n\n\n\n<li>Patching needs to be done for all the systems, keeping high priority for internet facing apps\/systems. By doing so, the loose access points can be minimized for the attackers.<\/li>\n\n\n\n<li>Install an advanced Endpoint Detection and Response solution.<\/li>\n\n\n\n<li>A very well formulated disaster and recovery plan for all the critical systems.<\/li>\n\n\n\n<li>Encrypting sensitive data using best in place mechanisms to secure sensitive data.<\/li>\n\n\n\n<li>Systems and end users must be enforced with the least privilege Also logging must be done about all the key accesses.<\/li>\n\n\n\n<li>Multi-factor authentication (MFA) for all critical systems including VPN access must be implemented.<\/li>\n<\/ul>\n\n\n\n<p>References;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cbc.ca\/news\/canada\/calgary\/calgary-public-library-cyberattack-ransomware-1.7356464\">https:\/\/www.cbc.ca\/news\/canada\/calgary\/calgary-public-library-cyberattack-ransomware-1.7356464<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC8463105\/#bib001\">https:\/\/pmc.ncbi.nlm.nih.gov\/articles\/PMC8463105\/#bib001<\/a><\/p>\n\n\n\n<p>Lallie H., Shepherd L., Nurse J., Erola A., Epiphaniou G., Maple C., Bellekens X. Cyber security in the age of covid-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. arXiv preprint arXiv:2006.11929. 2020 doi: 10.1016\/j.cose.2021.102248.<\/p>\n\n\n\n<p>Tailor J., Patel A. A comprehensive survey: ransomware attacks prevention, monitoring and damage control. International Journal of Research and Scientific Innovation (IJRSI) 2017;4:2321\u20132705.<\/p>\n\n\n\n<p>Kok S., Abdullah A., Jhanjhi N., Supramaniam M. Prevention of crypto-ransomware using a pre-encryption detection algorithm. Computers. 2019;8(4):79<\/p>\n\n\n\n<p>Dargahi T., Dehghantanha A., Bahrami P.N., Conti M., Bianchi G., Benedetto L. A cyber-kill-chain based taxonomy of crypto-ransomware features. Journal of Computer Virology and Hacking Techniques. 2019;15:277\u2013305.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What happened? On Oct 11th 2024 all 22 locations of public libraries across Calgary was shut down amid a cyber-attack. The early news suspected it to be the ransomware attack endangering public\u2019s crucial data at the hands of attackers. Why was library targeted? &#8220;Libraries are a rich target, and the reason that they&#8217;re rich target &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/2024\/10\/23\/calgary-public-librarys-cyber-attack\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Calgary Public Library\u2019s Cyber Attack&#8221;<\/span><\/a><\/p>\n","protected":false},"author":684,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-883","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"Maheen Shahzaib","author_link":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/author\/maheen-shahzaib\/"},"_links":{"self":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/users\/684"}],"replies":[{"embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":1,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/883\/revisions"}],"predecessor-version":[{"id":886,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/posts\/883\/revisions\/886"}],"wp:attachment":[{"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/media?parent=883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/categories?post=883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wpsites.ucalgary.ca\/jacobson-cpsc\/wp-json\/wp\/v2\/tags?post=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}