WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships When Ransomware Strikes, 'Assume Data Breach' Too
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

When Ransomware Strikes, ‘Assume Data Breach’ Too

Author: Jennifer Walker

Created: Tuesday, February 11, 2020 - 19:03

Categories: Cybersecurity, General Security and Resilience

With ransomware attacks evolving to include additional fallout such as data breaches, even organizations that seemed well-prepared can fall victim, as described in an ArsTechnica post about the Credit Union National Association (CUNA). CUNA demonstrates serious commitment to protecting against ransomware, including staging a ransomware exercise with member credit unions. But a few months later CUNA experienced a business disruption caused by ransomware. As reported in the Security & Resilience Update for December 17, 2019, ransomware operators (specifically groups associated with MAZE and Sodinikibi/REvil) have adopted the model of actually releasing stolen data to coerce victims into paying; it was only a matter of time. Prior to this development, most ransomware breach notifications included the wishful thinking and naïve belief that ‘no personally identifiable information (PII) was breached’ in an effort to downplay the failure to properly maintain the confidentiality, integrity, and availability (CIA) of data they were entrusted. This is a belief that can no longer be subscribed to. Like the adage, ‘it’s not if you’ll experience a cyber attack, but when,’ it’s not ‘we don’t believe any PII was stolen,’ it’s, ‘we haven’t been threatened by the attackers to publicly release the data yet.’ While encrypted uncompromised backups are the best way to recover from a ransomware attack, encrypting the data in the first place and securely managing the decryption key is even better to confound the ability of ransomware actors to read any data they have stolen. Read the post at ArsTechnica

 

For more on ransomware actors’ attack strategies, visit KnowBe4’s post: Encryption Isn’t Your Only Ransomware Problem – There Are Some Other Nasty Issues

Related Resources

(TLP:CLEAR) WaterISAC Notification – CISA Issues Cyber Alert ​​for Supply Chain Compromise Impacting Axios Node Package Manager​

Apr 20, 2026 in Cybersecurity, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated April 17, 2026)

Apr 17, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness

(TLP:CLEAR) Claude Mythos Preview: The AI Inflection Point in Vulnerability Management

Apr 16, 2026 in Cybersecurity, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar