In March 2022, Wilson Tool Intl. experienced a devastating cyberattack that left the company locked out of its information technology (IT) systems. The attack affected everything from enterprise resource planning software to modeling software, putting the company’s operations and sensitive data at risk. Wilson Tool managed to regain control of its systems and data after paying a ransom, but the incident served as a wake-up call for manufacturing companies about the increasing threat of cybercrime.
The cyberattack on Wilson Tool highlighted one of the common vulnerabilities that cybercriminals exploit – outdated and unpatched systems. Investigators found that the attack was made possible because Wilson Tool had delayed patching an old email server. This allowed the cybercriminals to find a crack in the server and gain entry into the company’s IT systems. Once inside, they waited to gather information and assume the role of system administrators.
Cybercriminals operate in a sophisticated and organized manner, making it easier for them to carry out successful attacks. They often start by searching for weaknesses in a company’s IT systems, such as outdated servers or employees who can be easily tricked into providing access. They then sell this information to more skilled cybercriminals who can gain control over the IT infrastructure and lock out the original administrators. These cybercriminals operate under names like Medusa or Conti and are part of a lucrative business model.
While ransomware attacks may get the most headlines, wire fraud is actually the most common cybercrime. Cybercriminals only need access to an email account to carry out wire fraud. They go through email records to find bills and then send out emails pretending to be the legitimate recipient, convincing individuals or organizations to send money to fraudulent bank accounts. This type of fraud can affect anyone, as cybercriminals are constantly looking for easy targets.
Protecting against cybercrime may seem overwhelming for small to medium-sized businesses, but it is a necessary part of operating in a digitally connected world. Bryce Austin, founder of cybersecurity consultancy TCE Strategy, suggests that companies consider working with a third-party cybersecurity specialist to assess and strengthen their IT systems. This could be a part-time relationship, similar to having an attorney on retainer. Companies should also take proactive measures to enhance their cybersecurity.
One important step is to be vigilant against phishing scams. Companies should educate employees about the risks of clicking on suspicious links or providing sensitive information in response to emails. Employing multifactor authentication on email accounts adds an extra layer of security by requiring two steps to log in. This can prevent unauthorized access even if login credentials are compromised.
Investing in a strong antivirus package is also crucial. This helps protect against malware and viruses that can compromise a company’s network. Regularly updating and patching systems is essential to fix any vulnerabilities and stay protected against new threats.
Companies should also consider offline backups of their data as a safeguard against ransomware attacks. Storing backups offline makes them harder for cybercriminals to access and ensures that data can be restored even if systems are compromised.
Providing training to IT staff is another important aspect of improving cybersecurity. IT professionals should be equipped with the necessary knowledge and skills to identify and respond to potential threats. Cybersecurity is a specialized field, and companies should ensure that their IT staff is adequately trained to handle the evolving risks.
In conclusion, the cyberattack on Wilson Tool serves as a reminder that manufacturing companies, regardless of their size, are vulnerable to cybercrime. The growing sophistication of cybercriminals requires businesses to take cybersecurity seriously and implement proactive measures to protect their systems and data. By investing in the right resources and following best practices, companies can reduce the risk of falling victim to cyberattacks and safeguard their operations.