A US government contractor is the latest victim to be taken down by a ransomware attack.
Electronic Warfare Associates (EWA) have the Department of Defense, Department of Homeland Security and the Department of Justice listed among clients that they serve, describing the company as a veteran-owned business with a track record dating back over the last four decade.
The company claims to be working on projects in the areas of blockchain, anti-drone capabilities, location tracking as well as quantum technology. But it appears that the company's own technology credentials have taken a hit with the latest ransomware attack.
The website for its subsidiaries, EWA Government Systems and Simplicity, are currently down with no word on just how widespread the attack was or how it has affected the organization.
Its government accounts will undoubtedly want to know if the attackers managed to steal sensitive corporate information, as this is more than likely the case.
A new malware strain called Ryuk Stealer was discovered in late 2019. Keywords like Military, Defense, Government and Engineering have raised suspicions that the creators may be preparing to target the stealer at organizations like EWA and its customers.
Last year, Lake City and Key Biscayne of Florida were forced to pay a ransom to recover encrypted files and systems after Ryuk was found infecting systems.
Any non-federal organization that works or provides services to the federal government must comply with the NIST 800-171 compliance standard. The requirements in 171 are very descriptive in what needs to be accomplished but does not advise or prioritize where to start. The Center for Internet Security understands that companies use several frameworks including 800-171 to help guide their cybersecurity strategy.
The CIS Controls were developed to work as a companion to additional frameworks like 800-171 to help prioritize efforts and action to become compliant. These Controls are not just another list of good things to do, but a prioritized, highly focused set of actions that make them implementable, usable, scalable, and compliant with all industry or government security requirements.