UPDATED 18:52 EDT / JANUARY 11 2023

SECURITY

The Guardian confirms December cyberattack involved ransomware

Guardian News & Media Ltd., the publisher of the U.K. newspaper The Guardian, today confirmed that a cyberattack that disrupted its internal services in December was a ransomware attack.

In an email sent to staff today, the attack was described as a “highly sophisticated cyber-attack involving unauthorized third-party access to parts of our network.” The attack vector is believed to have been most likely a successful phishing email.

Personal data of U.K. staff members are said to have been accessed during the incident. Reader and subscriber data, along with information relating to Guardian staff in the U.S. and Australia, is not believed to have been accessed.

No evidence has been found of the data being shared online, with employees told that the risk of fraud is therefore considered low. The email did warn, though, that “there is the potential for these types of data to be combined and used for identity fraud.” Affected staff are being offered free support against identity theft from Experian plc.

“We believe this was a criminal ransomware attack and not the specific targeting of the Guardian as a media organization,” the email read. “These attacks have become more frequent and sophisticated in the past three years, against organizations of all sizes, and kinds, in all countries.”

The attack, which occurred in the week before Christmas, did not affect the online publishing of The Guardian but resulted in a disruption to behind-the-scenes services. Employees were also told to work from home while the attack was being dealt with.

Forward three weeks and Guardian staff are still working from home and a return to working at the newspaper’s office has been postponed until early February. The Guardian expects some critical systems to be back up and running “within the next two weeks.”

“This is a lesson that no matter the industry you are in, you are a target for ransomware,” Erich Kron, security awareness advocate at security awareness training company KnowBe4 Inc., told SiliconANGLE. “The initial infection vector here, email phishing, is one of the most common and successful attack types when it comes to ransomware.”

Kron added that organizations should ensure they have good, tested and offline backups, and should ensure they’re educating their staff on how to identify and report phishing emails. “In addition, data loss prevention controls are critical as bad actors often steal data and use the threat of releasing it publicly to extort victims,” he said.

Photo: The Guardian

A message from John Furrier, co-founder of SiliconANGLE:

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU