Food and Agriculture (FA) sector partners hit with a string of destroyed food processing facilities are now being warned over concerns of ransomware attacks by the Federal Bureau of Investigation (FBI)..The Western Standard on Friday released an exclusive story examining how food shortages have been exacerbated by a string of fires, plane crashes, and explosions at nearly two dozen food processing facilities across Canada and the US..The FBI said reports of cyberattacks in the FA sector are concerning and could be on the rise, especially during critical seasons..“Ransomware actors may be more likely to attack agriculture cooperatives during critical planting and harvest seasons,” said the FBI in a release..The FBI noted six cyberattacks on grain cooperatives during the fall harvest of 2021 and two attacks have been reported so far for 2022 “that could impact the planting season by disrupting the supply of seeds and fertilizer.”.In March 2022, a multi-state grain company suffered a Lockbit 2.0 ransomware attack.In addition to grain processing, the company provides seed, fertilizer, and logisticservices, which are critical during the spring planting season.In February 2022, a company providing feed milling and other agricultural servicesreported two instances in which an unauthorized actor gained access to some of itssystems and may have attempted to initiate a ransomware attack. The attempts weredetected and stopped before encryption occurred.Between 15 September and 6 October 2021, six grain cooperatives experiencedransomware attacks. A variety of ransomware variants were used, including Conti,BlackMatter, Suncrypt, Sodinokibi, and BlackByte. Some targeted entities had tocompletely halt production while others lost administrative functions.In July 2021, a business management software company found malicious activity on itsnetwork, which was later identified as HelloKitty/Five Hands ransomware. The threatactor demanded USD$30 million ransom. The ransomware attack on the company ledto secondary ransomware infections on a number of its clients, which included severalagricultural cooperatives..“Cyber actors may perceive cooperatives as lucrative targets with a willingness to pay due to the time-sensitive role they play in agricultural production,” said the FBI..“Although ransomware attacks against the entire farm-to-table spectrum of the FA sector occur on a regular basis, the number of cyberattacks against agricultural cooperatives during key seasons is notable.”.FBI warned ransomware tactics and techniques are evolving and “sophisticated, high-impact ransomware incidents” are increasing globally..“Since 2021, multiple agricultural cooperatives have been impacted by a variety of ransomware variants,” said the FBI..“Production was impacted for some of the targeted entities, resulting in slower processing due to manual operations, while other targeted entities lost access to administrative functions such as websites and email but did not have production impacted.”.The risk of disruptions within different food producers can lead to varying consequences and impact the entire food chain, in some circumstances..As an example, the FBI said a disruption of grain production could not only affect human consumption, but could also affect the supply of animal feed. An attack on producers of protein or dairy products can result in spoiled products and “cascading effects down to the farm level.”.FBI said as cyberthreats increase, businesses need to implement steps to protect against such attacks..FBI suggested security steps:.Regularly back up data, air gap, and password-protect backup copies offline. Ensurecopies of critical data are not accessible for modification or deletion from the systemwhere the data resides.Implement a recovery plan that includes maintaining and retaining multiple copies ofsensitive or proprietary data and servers in a physically separate, segmented, securelocation (i.e., hard drive, storage device, the cloud).Identify critical functions and develop an operations plan in the event that systems gooffline. Think about ways to operate manually if it becomes necessary.Implement network segmentation.Install updates/patch operating systems, software, and firmware as soon as they arereleased.Use multi-factor authentication where possible.Use strong passwords and regularly change passwords to network systems andaccounts, implementing the shortest acceptable time frame for password changes. Avoidreusing passwords for multiple accounts and use strong pass phrases where possible.Disable unused remote access/RDP ports and monitor remote access/RDP logs.Require administrator credentials to install software.Audit user accounts with administrative or elevated privileges, and configure accesscontrols with least privilege in mind.Install and regularly update anti-virus and anti-malware software on all hosts.Only use secure networks and avoid using public Wi-Fi networks. Consider installing andusing a virtual private network (VPN).Consider adding an email banner to messages coming from outside your organizations.Disable hyperlinks in received emails.Focus on cybersecurity awareness and training. Regularly provide users with training oninformation security principles and techniques as well as overall emerging cybersecurityrisks and vulnerabilities (i.e., ransomware and phishing scams)..“The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to their local FBI field office.”.Melanie Risdon is a reporter with the Western Standard.,.mrisdon@westernstandard.news.This is what the Western Standard is up againstThe Trudeau government is funding lies and propaganda by directly subsidizing the mainstream media. They do this to entrench the powerful Eastern, woke and corrupt interests that dominate the political, social and economic institutions in Canada. Federal authorities are constantly trying to censor us and stop us from publishing the stories that they don’t want you to read. Ottawa may weaponize our taxes and police against us, but we’ve got a powerful ally on our side.You. Free men, and free women. We need you to stand with us and become a member of the Western Standard. Here’s what you will get for your membership:Unlimited access to all articles from the Western Standard, Alberta Report, West Coast Standard, and Saskatchewan Standard, with no paywall. Our daily newsletter delivered to your inbox. .Access to exclusive Member-only WS events.Keep the West’s leading independent media voice strong and free.If you can, please support us with a monthly or annual membership. It takes just a moment to set up, and you will be making a big impact on keeping one the last independent media outlets in Canada free from Ottawa’s corrupting influence.
Food and Agriculture (FA) sector partners hit with a string of destroyed food processing facilities are now being warned over concerns of ransomware attacks by the Federal Bureau of Investigation (FBI)..The Western Standard on Friday released an exclusive story examining how food shortages have been exacerbated by a string of fires, plane crashes, and explosions at nearly two dozen food processing facilities across Canada and the US..The FBI said reports of cyberattacks in the FA sector are concerning and could be on the rise, especially during critical seasons..“Ransomware actors may be more likely to attack agriculture cooperatives during critical planting and harvest seasons,” said the FBI in a release..The FBI noted six cyberattacks on grain cooperatives during the fall harvest of 2021 and two attacks have been reported so far for 2022 “that could impact the planting season by disrupting the supply of seeds and fertilizer.”.In March 2022, a multi-state grain company suffered a Lockbit 2.0 ransomware attack.In addition to grain processing, the company provides seed, fertilizer, and logisticservices, which are critical during the spring planting season.In February 2022, a company providing feed milling and other agricultural servicesreported two instances in which an unauthorized actor gained access to some of itssystems and may have attempted to initiate a ransomware attack. The attempts weredetected and stopped before encryption occurred.Between 15 September and 6 October 2021, six grain cooperatives experiencedransomware attacks. A variety of ransomware variants were used, including Conti,BlackMatter, Suncrypt, Sodinokibi, and BlackByte. Some targeted entities had tocompletely halt production while others lost administrative functions.In July 2021, a business management software company found malicious activity on itsnetwork, which was later identified as HelloKitty/Five Hands ransomware. The threatactor demanded USD$30 million ransom. The ransomware attack on the company ledto secondary ransomware infections on a number of its clients, which included severalagricultural cooperatives..“Cyber actors may perceive cooperatives as lucrative targets with a willingness to pay due to the time-sensitive role they play in agricultural production,” said the FBI..“Although ransomware attacks against the entire farm-to-table spectrum of the FA sector occur on a regular basis, the number of cyberattacks against agricultural cooperatives during key seasons is notable.”.FBI warned ransomware tactics and techniques are evolving and “sophisticated, high-impact ransomware incidents” are increasing globally..“Since 2021, multiple agricultural cooperatives have been impacted by a variety of ransomware variants,” said the FBI..“Production was impacted for some of the targeted entities, resulting in slower processing due to manual operations, while other targeted entities lost access to administrative functions such as websites and email but did not have production impacted.”.The risk of disruptions within different food producers can lead to varying consequences and impact the entire food chain, in some circumstances..As an example, the FBI said a disruption of grain production could not only affect human consumption, but could also affect the supply of animal feed. An attack on producers of protein or dairy products can result in spoiled products and “cascading effects down to the farm level.”.FBI said as cyberthreats increase, businesses need to implement steps to protect against such attacks..FBI suggested security steps:.Regularly back up data, air gap, and password-protect backup copies offline. Ensurecopies of critical data are not accessible for modification or deletion from the systemwhere the data resides.Implement a recovery plan that includes maintaining and retaining multiple copies ofsensitive or proprietary data and servers in a physically separate, segmented, securelocation (i.e., hard drive, storage device, the cloud).Identify critical functions and develop an operations plan in the event that systems gooffline. Think about ways to operate manually if it becomes necessary.Implement network segmentation.Install updates/patch operating systems, software, and firmware as soon as they arereleased.Use multi-factor authentication where possible.Use strong passwords and regularly change passwords to network systems andaccounts, implementing the shortest acceptable time frame for password changes. Avoidreusing passwords for multiple accounts and use strong pass phrases where possible.Disable unused remote access/RDP ports and monitor remote access/RDP logs.Require administrator credentials to install software.Audit user accounts with administrative or elevated privileges, and configure accesscontrols with least privilege in mind.Install and regularly update anti-virus and anti-malware software on all hosts.Only use secure networks and avoid using public Wi-Fi networks. Consider installing andusing a virtual private network (VPN).Consider adding an email banner to messages coming from outside your organizations.Disable hyperlinks in received emails.Focus on cybersecurity awareness and training. Regularly provide users with training oninformation security principles and techniques as well as overall emerging cybersecurityrisks and vulnerabilities (i.e., ransomware and phishing scams)..“The FBI encourages recipients of this document to report information concerning suspicious or criminal activity to their local FBI field office.”.Melanie Risdon is a reporter with the Western Standard.,.mrisdon@westernstandard.news.This is what the Western Standard is up againstThe Trudeau government is funding lies and propaganda by directly subsidizing the mainstream media. They do this to entrench the powerful Eastern, woke and corrupt interests that dominate the political, social and economic institutions in Canada. Federal authorities are constantly trying to censor us and stop us from publishing the stories that they don’t want you to read. Ottawa may weaponize our taxes and police against us, but we’ve got a powerful ally on our side.You. Free men, and free women. We need you to stand with us and become a member of the Western Standard. Here’s what you will get for your membership:Unlimited access to all articles from the Western Standard, Alberta Report, West Coast Standard, and Saskatchewan Standard, with no paywall. Our daily newsletter delivered to your inbox. .Access to exclusive Member-only WS events.Keep the West’s leading independent media voice strong and free.If you can, please support us with a monthly or annual membership. It takes just a moment to set up, and you will be making a big impact on keeping one the last independent media outlets in Canada free from Ottawa’s corrupting influence.