Canada 2024 Cyberattacks AI Generated

Beyond the Breach: Lessons Learned from 2024 Cyberattacks

In 2024, cyberattacks have shaken the digital landscape, exposing vulnerabilities and causing widespread data breaches. These events have reshaped cybersecurity practices, forcing organizations to reevaluate their cyber risk management strategies and invest in robust cyber insurance policies.

The evolving threat landscape has made cyber risk assessment more crucial than ever as businesses grapple with sophisticated ransomware, malware, and phishing attacks.

Incident Response: Lessons from Major Breaches

There has been a notable increase in cyber assaults in 2024, which have revealed weaknesses and resulted in extensive data breaches in numerous industries.

Cyber assaults are typically documented and scrutinized over time, and the complete ramifications of certain incidents may not be immediately apparent. However, considering patterns and documented incidents, it is reasonable to anticipate that various forms of attacks will likely be widespread in 2024.

Ransomware

Cybercriminals specializing in ransomware often direct their attacks toward critical infrastructure, healthcare institutions, and businesses, intending to extort financial benefits.

Regrettably, as outlined in the Gen Q2/2024 Threat Report, the menace posed by ransomware shows no signs of diminishing; on the contrary, it is escalating.

Examples of ransomware from 2024

London Drugs, a retail company, recently faced a cyberattack in April 2024, during which hackers stole files from its corporate headquarters. According to the Financial Post, London Drugs was targeted with a ransom demand of $25 million, and a deadline for payment was set for Thursday, May 2nd. In response to the breach, the company refused to pay the ransom demanded by the cybercriminals.

However, since the attack, the hackers have released some of the stolen data. London Drugs expressed deep concern over this distressing situation and acknowledged that the compromised files may contain employee information.

This revelation came after Brett Callow, a threat analyst with Emsisoft, an anti-virus software company, posted on social media that the hacking group known as LockBit claimed responsibility for the attack and released what it claimed was the London Drug’s company data. The attack resulted in the closure of all 79 London Drugs stores for over a week.

Data Breaches

Data breaches remain a lucrative target for cybercriminals, who seek to obtain sensitive personal and corporate information. Such breaches have severe consequences, including identity theft, financial fraud, and damage to reputation. Data that is highly sought after by fraudsters globally includes:

  • Employee login credentials
  • Customer credit card information
  • Social Insurance Numbers
  • Bank account numbers

Examples of data breaches from 2024

In 2024, there was a significant incident of data breach involving Patelco Credit Union. This particular breach occurred in June and resulted in unauthorized access to sensitive customer information. The compromised data included personal details such as names, addresses, Social Insurance numbers, and financial information.

The attackers responsible for this breach are believed to be connected to the BlackSuit ransomware group. They managed to gain entry into Patelco’s systems and encrypt the data.

The Patelco Credit Union recently disclosed in an updated public filing that the personal data of over one million individuals, including current and former members and employees, was compromised.

Details: Canada; StatCan; 2014 to 2023; Criminal harassment

Phishing and Social Engineering

These tactics involve deceiving individuals into clicking on harmful links or divulging personal information. These attacks can be utilized to distribute malware or obtain unauthorized entry into computer systems.

It is important to note that phishing attacks may even masquerade as communications from various types of organizations, including your own internal workplace or even non-profit charities. Attackers often take advantage of current events and certain times of the year, such as:

    • Natural disasters (e.g., Hurricane Katrina, Indonesian tsunami)
    • Epidemics and health scares (e.g., H1N1, COVID-19)
    • Economic concerns (e.g., tax scams)
    • Major political elections
    • Holidays

Examples of data breaches from 2024

According to a recent survey conducted by Interac Corp., a payment processing company, government impersonation is a prevalent financial scam affecting individuals across Canada. The survey revealed that 42% of the respondents reported encountering scammers who pretended to be representatives of official government institutions.

Government Representative Scammers Statistics

41%

Related to phishing scams

24%

Related to fake banking, credit cards, and online accounts

 

Rachel Jolicoeur, the director of cyber market intelligence and financial crimes at Interac, emphasized the professionalism and opportunistic nature of these criminals:

There’s always a call to action and a sense of urgency…a

s soon as you get that feeling, just stop and pause on that to scrutinize.

The Interac survey, which collected responses from 1,202 individuals online between September 28th and October 6th. In recent months, the Canadian government has issued multiple alerts to caution citizens about the prevalence of fraudulent activities.

Interac Survey Respondent Feedback to being Targeted by Fincial Scams:

53%

Is a common occurrence in Canada

40%

Expressed worry about falling victim to scams

 

Data Breaches Report from 2024

Cost Per Data Breaches Paid by Canadian Organizations(by the million):

CA $6.32

Average for Canadian Organization

 CA $9.28

Average for Financial Services Sector

CA $7.84

Average for Technology Companies

Interestingly, the average cost of data breaches has decreased compared to the previous year. Additionally, Canada has dropped from the third position globally for the costliest data breaches to the sixth position.

This reduction in breach costs can be attributed in part to 61% of Canadian companies’ adoption of security AI and automation to prevent such incidents. According to a study conducted by IBM, companies that heavily incorporate Artificial Intelligence (AI) and automation into their security operations experienced breach lifecycles that were 54 days shorter than those organizations that did not utilize these technologies.

Daina Proctor, IBM Canada’s security service line delivery leader, commented:

Canadian organizations that invest in AI and automation will be better equipped to detect and recover from breaches, reducing the significant costs associated with these events.”

“The findings of this report underscore the business imperative for companies to integrate AI and automation into their cybersecurity programs to reduce both the financial impact and business disruption of cyber breaches.

Evolution of Ransomware Tactics

Ransomware attacks have increased13% rise in ransomware attacks over the past five years, with an average cost of CA 2.57 million per incident in 2023.

The escalation in attack volume is evident, as organizations worldwide detected nearly half a billion ransomware attacks in 2022.

“The Gen Threat Report, formerly known as the Avast Threat Report, has revealed a 100% increase in ransomware activity for the US, UK, and Canada; 66% in Australia; and a whopping 379% in India.” – Nyrmah J. Reina

The severity of these attacks has also intensified. The average downtime a company experiences after a ransomware attack is now 24 days, causing significant disruptions to business operations. Moreover, the financial demands have reached unprecedented levels, with the highest ransomware payment demand ever recorded being CA 97.16 million.

Negotiation Strategies and Outcomes

As ransomware attacks have become more sophisticated, so too have the negotiation strategies employed by both attackers and victims. Cybercriminals have become more strategic in setting ransom expectations, often basing their demands on open-source information about the target organization’s revenue or cyber insurance coverage.

Ransomware negotiators play a crucial role in managing these high-stakes situations.

They engage with threat groups on behalf of the affected organization, attempting to lower ransom demands and buy time for the victim. However, some ransomware authors have threatened to delete decryption keys if professional negotiators intervene, adding another layer of complexity to the process.

Ransomware Outcomes Statistics:

80%

Who submitted a ransom payment experienced another attack soon after

46%

Regained access to their data, but most of it was corrupted

 

Emerging Threats: AI and Deepfakes

Growth of AI-assisted Attacks

The rapid adoption of artificial intelligence (AI) has introduced complex cybersecurity risks that traditional practices may not sufficiently address. From January to February 2023 alone, researchers observed a 135% increase in ‘novel social engineering attacks,’ corresponding to the widespread adoption of ChatGPT. This surge highlights the growing threat of  AI-assisted cyberattacks.

The AI Problem: Malicious actors are now using AI to launch and exploit vulnerabilities at speeds, scales, and levels of precision previously unattainable by human hackers. AI empowers attackers to create malware that transforms to evade detection, craft highly compelling phishing exploits, and automate advanced attacks

One of the most significant concerns is using AI in social engineering attacks. Cybercriminals can now leverage AI language models to study a target’s entire email history and communication patterns, crafting perfectly authentic-sounding phishing messages. This capability allows them to build trust quickly and increase the likelihood of successful exploitation.

Can you spot the deepfake? How AI is threatening elections

 

Deepfake Risks for Businesses

Deepfakes – synthetic, AI-generated media designed to manipulate or replace existing video, image, or audio content with a fabricated version – pose a significant threat to businesses and individuals alike. These AI-generated fakes can have serious consequences, such as influencing political decisions or causing public panic.

The low barrier to entry for creating deepfakes exacerbates the problem. Widely available tools and accessible AI technologies make it easy for malicious actors to produce convincing fake content. This accessibility has increased reputational attacks, revenge plots, and fraudulent activities targeting businesses and public figures.

Deepfakes can be used to undermine brand reputation, impersonate leaders and financial officers, and compromise vital data and systems. For example, a fake but realistic-looking video of a CEO making inappropriate comments or contradictory statements can severely damage a brand’s image and lead to significant reputation loss.

Key Lessons Learned

    • Implement Comprehensive Cyber Risk Management: Strategies must be holistic to address evolving threats introduced by new technologies like generative AI and third-party integrations.

    • Prioritize Rapid Detection and Response: Organizations that utilize AI and automation for security prevention saw a significant reduction in breach costs, saving an average CA $2.84 million compared to those that did not.

  • Maintain a Proactive Posture: Essential practices include regular cyber risk assessments, implementing advanced threat detection systems, and developing comprehensive incident response plans.

Stay Connected With Harvard Western

Thanks for reading our article; I hope you enjoyed this month’s topic on Cyber Attacks in Canada. Here are some more ways to access more insurance information and tips:

1.

Visit our Blog/article page each month, where we publish various insurance articles and share information on specific industry products.

2.

Learn more about or get a quote for Business Insurance, and visit our product page for comprehensive information.

PRODUCT PAGE

3.

Follow us on LinkedIn to stay up to date on the latest insurance articles and company updates.

SUBSCRIBE ON LINKEDIN

Last updated: