{"id":115812,"date":"2021-06-03T19:54:12","date_gmt":"2021-06-03T19:54:12","guid":{"rendered":"https:\/\/fin2me.com\/?p=115812"},"modified":"2021-06-03T19:54:12","modified_gmt":"2021-06-03T19:54:12","slug":"exclusive-u-s-to-give-ransomware-hacks-similar-priority-as-terrorism-official-says","status":"publish","type":"post","link":"https:\/\/fin2me.com\/markets\/exclusive-u-s-to-give-ransomware-hacks-similar-priority-as-terrorism-official-says\/","title":{"rendered":"Exclusive-U.S. to give ransomware hacks similar priority as terrorism, official says"},"content":{"rendered":"
WASHINGTON (Reuters) – The U.S. Department of Justice is elevating investigations of ransomware attacks to a similar priority as terrorism in the wake of the Colonial Pipeline hack and mounting damage caused by cyber criminals, a senior department official told Reuters.<\/p> Internal guidance sent on Thursday to U.S. attorney\u2019s offices across the country said information about ransomware investigations in the field should be centrally coordinated with a recently created task force in Washington.<\/p>\n \u201cIt\u2019s a specialized process to ensure we track all ransomware cases regardless of where it may be referred in this country, so you can make the connections between actors and work your way up to disrupt the whole chain,\u201d said John Carlin, principle associate deputy attorney general at the Justice Department.<\/p>\n Last month, a cyber criminal group that the U.S. authorities said operates from Russia, penetrated the pipeline operator on the U.S. East Coast, locking its systems and demanding a ransom. The hack caused a shutdown lasting several days, led to a spike in gas prices, panic buying and localized fuel shortages in the southeast.<\/p>\n Colonial Pipeline decided to pay the hackers who invaded their systems nearly $5 million to regain access, the company said.<\/p>\n The DOJ guidance specifically refers to Colonial as an example of the \u201cgrowing threat that ransomware and digital extortion pose to the nation.\u201d<\/p>\n \u201cTo ensure we can make necessary connections across national and global cases and investigations, and to allow us to develop a comprehensive picture of the national and economic security threats we face, we must enhance and centralize our internal tracking,\u201d said the guidance seen by Reuters and previously unreported.<\/p>\n The Justice Department\u2019s decision to push ransomware into this special process illustrates how the issue is being prioritized, U.S. officials said.<\/p>\n \u201cWe\u2019ve used this model around terrorism before but never with ransomware,\u201d said Carlin. The process has typically been reserved for a short list of topics, including national security cases, legal experts said.<\/p>\n In practice, it means that investigators in U.S. attorney\u2019s offices handling ransomware attacks will be expected to share both updated case details and active technical information with leaders in Washington.<\/p>\n The guidance also asks the offices to look at and include other investigations focused on the larger cybercrime ecosystem.<\/p>\n According to the guidance, the list of investigations that now require central notification include cases involving: counter anti-virus services, illicit online forums or marketplaces, cryptocurrency exchanges, bulletproof hosting services, botnets and online money laundering services.<\/p>\n Bulletproof hosting services refer to opaque internet infrastructure registration services which help cyber criminals to anonymously conduct intrusions.<\/p>\n A botnet is a group of compromised internet-connected devices that can be manipulated to cause digital havoc. Hackers build, buy and rent out botnets in order to conduct cyber crimes ranging from advertising fraud to large cyberattacks.<\/p>\n \u201cWe really want to make sure prosecutors and criminal investigators report and are tracking … cryptocurrency exchanges, illicit online forums or marketplaces where people are selling hacking tools, network access credentials – going after the botnets that serve multiple purposes,\u201d said Carlin.<\/p>\n Mark Califano, a former U.S. attorney and cybercrime expert, said the \u201cheightened reporting could allow DOJ to more effectively deploy resources\u201d and to \u201cidentify common exploits\u201d used by cybercriminals.<\/p>\n