What We Do
How we do it
Our Threat Response Unit (TRU) publishes security advisories, blogs, reports, industry publications and webinars based on its original research and the insights driven through proactive threat hunts.
View Threat Intelligence Resources →
Jan 19, 2023
Increased Activity in Google Ads Distributing Information Stealers
THE THREAT On January 18th, 2023, eSentire Threat Intelligence identified multiple reports, both externally and internally, containing information on an ongoing increase in Google advertisements…
Read More
View all Advisories →
About Us
eSentire is The Authority in Managed Detection and Response Services, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events.
Read about how we got here
Leadership Work at eSentire
Dec 13, 2022
eSentire Named First Managed Detection and Response Partner by Global Insurance Provider Coalition
Waterloo, ON – December 13, 2022 – eSentire, Inc., the Authority in Managed Detection and Response (MDR), today announced it has been named the first global MDR partner by Coalition, the world’s first Active Insurance provider designed to prevent digital risk before it strikes. Like Coalition, eSentire is committed to putting their customers’ businesses ahead of disruption by improving their…
Read More
e3 Ecosystem
We provide sophisticated cybersecurity solutions for Managed Security Service Providers (MSSPs), Managed Service Providers (MSPs), and Value-Added Resellers (VARs). Find out why you should partner with eSentire, the Authority in Managed Detection and Response, today.
Learn more
Apply to become an e3 ecosystem partner with eSentire, the Authority in Managed Detection and Response.
Login to the Partner Portal for resources and content for current partners.
Blog — Feb 03, 2020

Why the Travelex Incident Portends the Changing Nature of Ransomware

3 minutes read
Speak With A Security Expert Now

Originally posted in Infosecurity Magazine January 29, 2020

Like most New Year’s resolutions, most go off the rails by February. The hackers behind the recent Travelex attack didn’t wait that long to sound the GDPR and privacy alarms, and bring into light, new implications around transparency and timely notifications of data breaches.

Plagued by a sophisticated ‘hands on keyboard’ ransomware attack, Travelex initially declared their global system outage as maintenance downtime via message on their website. One week later, they replaced the initial message with a press release announcing a cyberattack as of December 31st 2019 (and as of January 27th, the company’s services were still down.)

In a press release dated January 7th 2020, the company explained that their investigation confirmed the ransomware attack was Sodinokibi, also referred to as REvil. The press release inferred that the attack occurred just a week before the public was notified. However, other reports have suggested the firm was compromised for as long as six months – and that hackers were demanding £4.6 million to recover and preserve the data from further exposure and resale on the dark web.

Various sources have suggested that Travelex failed to patch its Pulse Secure VPN servers until early November 2019, and that was despite repeated warnings flagged by the U.S. CISA, the U.S. National Security Agency and the UK's National Cybersecurity Centre in October 2019 that the vulnerabilities were being targeted and exploited by REvil.

This incident confirms that ransomware attacks have transitioned from opportunistic nuisance to something more sinister. It demonstrates the destructive capability of systemic ransomware designed to cripple large organizations and not just exploit small sums of cryptocurrency from individuals.

The era of transactional crime is over: we now live in an age of targeted strikes seeking large sums of money (to the tune of seven figures, in the Travelex case.) But money isn’t the only thing at risk; so is the firm’s reputation, not to mention its clients’ operations.

Since the incident took place – more than a dozen UK banks reported that their online foreign currency services went down as a result.

The attackers also threatened Travelex with the exposure and wholesale dumping of stolen data if the firm fails to pay the extortion fee, Maybe that’s the point: it’s no longer simplistic ransomware, but bigfish extortion. It’s a new game and one that is no longer about returning files, but rather about preventing exposure of information that compromises the reputation of the victim.

As the company resorted to pen and paper to operate, critical PII (personal financial information like credit card numbers, date of birth and other sensitive information) are at risk of exposure.

It seems criminals have been honing and socializing their tactics, and now it’s about paying extortion fees, and heading down the oft avoided slippery slope of negotiating with terrorists. The criminals have them in check, your move ICO and Travelex.

The system outage at Travelex was masked with a ‘planned maintenance’ message, which is understandable on the part of Travelex, but it raises questions of the ethics around such a choice. By masking the real event, this prevents consumers and customers from being able to take protective actions such as putting holds on credit cards, setting up credit monitor with financial institutions or even changing passwords. Time is of the essence, and knowledge is power. It’s another factor that should be reviewed with the ICO and law enforcement (and the courts) weighing in on this potential deceit.

This New Year’s event exposes evolved issues brought on by targeted ransomware attacks. Should firms pay the ransom to avoid the exposure of personal consumer data? Is it acceptable for firms to mask attacks with system outages notices rather than breach notifications? How will the ICO enforce decisions around timely notification, obfuscation, and preservation of data privacy through extortion fees? We shall see over the coming year.

Perhaps 2020 will play to its visual acuity reference and provide clear vision on how companies must proceed in the event of such extortion attacks.

In the meantime, this event reinforces corporate need for tested incident response plans that go beyond the ones and zeros of IT security. Communications took center stage in this story, and it serves to demonstrate the value of crisis communication training and expertise.

View Most Recent Blogs

eSentire is the Authority in Managed Detection and Response, protecting the critical data and applications of 1500+ organizations in 80+ countries from known and unknown cyber threats. Founded in 2001, the company’s mission is to hunt, investigate and stop cyber threats before they become business disrupting events. Combining cutting-edge machine learning XDR technology, 24/7 Threat Hunting, and proven security operations leadership, eSentire mitigates business risk, and enables security at scale. The Team eSentire difference means enterprises are protected by the best in the business with a named Cyber Risk Advisor, 24/7 access to SOC Cyber Analysts & Elite Threat Hunters, and industry-leading threat intelligence research from eSentire’s Threat Response Unit (TRU). eSentire provides Managed Risk, Managed Detection and Response and Incident Response services. For more information, visit www.esentire.com and follow @eSentire.