Skip to content
NOWCAST WDSU News at 10pm
Watch on Demand
Advertisement

EXCLUSIVE: Top cyber leader warns of ransomware 'scourge,' admits government 'needs to do more'

CISA Acting Director Brandon Wales shares his top tips for preventing ransomware

EXCLUSIVE: Top cyber leader warns of ransomware 'scourge,' admits government 'needs to do more'

CISA Acting Director Brandon Wales shares his top tips for preventing ransomware

This is where all of our cyber operations are conducted as acting director, Brandon Wales leads the cyber security and infrastructure security agency at DH S. It's an agency inundated lately with reports of ransomware attacks on pipelines, meat packing plants, public transportation and more. Are we on defense right now? Well, ransomware is *** scourge that, that's been affecting American businesses and American governments. It is an epidemic that needs to be aggressive action needs to be taken on. We want to make the US law enforcement community have better ability to go after, find them, track the money and get it back. But right now, it doesn't sound like you've made it that hard. It's hitting companies more than ever. Now, we recognize that the US government needs to do more and private sector needs to do more, especially if it doesn't pay to pay *** new report out this week. By cyber reason. *** Boston based Cyber analytics firm finds 80% of businesses that paid *** ransom demand were attacked yet again later. Should companies be banned from paying ransom? I I'm not prepared to answer that question today, but what I can say is we want to make it much harder for ransomware operators to be successful. Two members of the Senate Intelligence Committee, Mark Warner Democrat Roy Blunt from Missouri Republican want greater regulation of Cryptocurrency, ransomware payments. Do you support their efforts to restrict Cryptocurrency from being used in ransomware payments? What I can say today is that the US government is taking aggressive action to be able to better track money, better identify ransomware operators so that we can go after them. Whale says consumers and businesses must take aggressive action as well. First, make sure that your systems are backed up the backup. Is it critical that it is not connected to your computer? Absolutely. Second use multi factor identification. It's going to prompt me for *** second password or *** pin code. Exactly. Third update and patch your systems just make sure that those automatic patches are turned on. Fourth. Make sure your security solutions are up to date. Everyone should be using some baseline anti virus basic defense to take as ransomware demands doubled in just one year in Washington. I'm chief, national investigative correspondent, Mark Albert.
Advertisement
EXCLUSIVE: Top cyber leader warns of ransomware 'scourge,' admits government 'needs to do more'

CISA Acting Director Brandon Wales shares his top tips for preventing ransomware

The top leader at the U.S. Department of Homeland Security's cyber security agency warns ransomware is a "scourge" and acknowledges the federal government "needs to do more" to combat hackers' ability to seize data and bring a halt to key parts of the American economy, transportation system, and food supply."Ransomware is a scourge that's been affecting American businesses and American governments," Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency (CISA) told the Hearst Television National Investigative Unit in an exclusive interview this week. "It is an epidemic that needs aggressive action, needs to be taken on."Government 'needs to do more'The comments come after successive high-profile ransomware attacks in the past several weeks against critical supply chains: the Colonial Pipeline fuel delivery system that caused gas shortages up and down the East Coast, JBS meat packing plants, and ferry booking services in Massachusetts, among other affected companies.When asked if the U.S. was on "defense," Wales admitted more needs to be done to combat the rising costs of ransomware."We want to make the U.S. law enforcement community have better ability to go after, find them, track the money and get it back," Wales said. "We recognize that the U.S. government needs to do more and private sector needs to do more."Ban ransomware payments? Wales spoke inside CISA's secure headquarters in northern Virginia where its cyber operations are conducted.The two-and-a-half-year-old agency has been inundated lately with reports of ransomware attacks – and businesses paying the ransom to regain access to their systems and data. A new report out this week by Cybereason, a Boston-based cyber analytics firm, finds 80 percent of businesses that paid a ransom demand were later attacked yet again, calling into question whether it pays to pay up.As the National Investigative Unit reported last month, ransomware demands doubled in just one year, from $15 million dollars on average to $30 million, and actual ransom payments nearly tripled, from an average $115,000 to $312,000, according to a report from Palo Alto Networks.Two members of the Senate Intelligence Committee, Mark Warner (D-Va.) and Roy Blunt (R-Mo.) recently expressed a desire for greater regulation of cryptocurrency, a favorite method used in ransomware payments due to its built-in anonymity and often difficult ability to track.When asked whether he would support legislation banning companies from paying such ransoms, Wales responded that he wasn’t "prepared to answer that question today, but what I can say is we want to make it much harder for ransomware operators to be successful." "The U.S. government is taking aggressive action to be able to better track money, better identify ransomware operators so that we can go after them," Wales said.Tips for consumers, companies But Wales also called on businesses and consumers to take more aggressive action, as well, including immediate steps to reduce their risk of becoming a target of ransomware – or a victim.Relying upon CISA's ransomware fact sheet, Wales listed the agency's top four tips:Make sure computer systems and files are backed up to devices that are not continuously connected to the physical computer;Use multifactor authentication so a hacker needs more than just a single password to access an account or system;Update and patch computer systems, easily accomplished by enabling automatic updates; andMake sure security solutions are up to date, including by using baseline antivirus software.For more cybersecurity news and tips, WATCH the National Investigative Unit's CYBERWATCH special report.Mark Albert is the chief national investigative correspondent for the Hearst Television National Investigative Unit, based in Washington D.C. April Chunko contributed to this report. Know of cyber security threats? Have a confidential tip or inside information? Send information and documents to the National Investigative Unit at investigate@hearst.com.

The top leader at the U.S. Department of Homeland Security's cyber security agency warns ransomware is a "scourge" and acknowledges the federal government "needs to do more" to combat hackers' ability to seize data and bring a halt to key parts of the American economy, transportation system, and food supply.

"Ransomware is a scourge that's been affecting American businesses and American governments," Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency (CISA) told the Hearst Television National Investigative Unit in an exclusive interview this week. "It is an epidemic that needs aggressive action, needs to be taken on."

Advertisement
Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency at D.H.S. speaks to Hearst Television Chief National Investigative Correspondent Mark Albert at CISA headquarters in northern Virginia on June 15, 2021.
Hearst Television
Brandon Wales, acting director of the Cybersecurity and Infrastructure Security Agency at D.H.S. speaks to Hearst Television Chief National Investigative Correspondent Mark Albert at CISA headquarters in northern Virginia on June 15, 2021.

Government 'needs to do more'

The comments come after successive high-profile ransomware attacks in the past several weeks against critical supply chains: the Colonial Pipeline fuel delivery system that caused gas shortages up and down the East Coast, JBS meat packing plants, and ferry booking services in Massachusetts, among other affected companies.

Colonial Pipeline
Hearst Television

When asked if the U.S. was on "defense," Wales admitted more needs to be done to combat the rising costs of ransomware.

"We want to make the U.S. law enforcement community have better ability to go after, find them, track the money and get it back," Wales said. "We recognize that the U.S. government needs to do more and [the] private sector needs to do more."

Ban ransomware payments?

Wales spoke inside CISA's secure headquarters in northern Virginia where its cyber operations are conducted.

The two-and-a-half-year-old agency has been inundated lately with reports of ransomware attacks – and businesses paying the ransom to regain access to their systems and data. A new report out this week by Cybereason, a Boston-based cyber analytics firm, finds 80 percent of businesses that paid a ransom demand were later attacked yet again, calling into question whether it pays to pay up.

As the National Investigative Unit reported last month, ransomware demands doubled in just one year, from $15 million dollars on average to $30 million, and actual ransom payments nearly tripled, from an average $115,000 to $312,000, according to a report from Palo Alto Networks.

Two members of the Senate Intelligence Committee, Mark Warner (D-Va.) and Roy Blunt (R-Mo.) recently expressed a desire for greater regulation of cryptocurrency, a favorite method used in ransomware payments due to its built-in anonymity and often difficult ability to track.

When asked whether he would support legislation banning companies from paying such ransoms, Wales responded that he wasn’t "prepared to answer that question today, but what I can say is we want to make it much harder for ransomware operators to be successful."

"The U.S. government is taking aggressive action to be able to better track money, better identify ransomware operators so that we can go after them," Wales said.

CISA Acting Director Brandon Wales shares with Hearst Television Chief National Investigative Correspondent Mark Albert top tips to prevent becoming a victim of ransomware.
Hearst Television
CISA Acting Director Brandon Wales shares with Hearst Television Chief National Investigative Correspondent Mark Albert top tips to prevent becoming a victim of ransomware.

Tips for consumers, companies

But Wales also called on businesses and consumers to take more aggressive action, as well, including immediate steps to reduce their risk of becoming a target of ransomware – or a victim.

Relying upon CISA's ransomware fact sheet, Wales listed the agency's top four tips:

  1. Make sure computer systems and files are backed up to devices that are not continuously connected to the physical computer;
  2. Use multifactor authentication so a hacker needs more than just a single password to access an account or system;
  3. Update and patch computer systems, easily accomplished by enabling automatic updates; and
  4. Make sure security solutions are up to date, including by using baseline antivirus software.

For more cybersecurity news and tips, WATCH the National Investigative Unit's CYBERWATCH special report.

Mark Albert is the chief national investigative correspondent for the Hearst Television National Investigative Unit, based in Washington D.C. April Chunko contributed to this report.

Know of cyber security threats? Have a confidential tip or inside information? Send information and documents to the National Investigative Unit at investigate@hearst.com.