Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Enterprise ServicesCybersecurity News

Lumen falls victim to 2 ransomware attacks

By Rachelle Blair-Frasier, Editor in Chief
criminal-on-laptop.jpg

Image via Unsplash

April 3, 2023

In a recent Securities and Exchange Commission filing, Lumen Technologies, Inc. reported it was the victim of two cyber attacks.

On March 27, Lumen announced two cybersecurity incidents. Earlier this month the company discovered that a malicious intruder had inserted criminal ransomware into a limited number of the company’s servers that support a segmented hosting service, this was degrading the operations of a small number of the Lumen’s enterprise customers.

The filing reported that the company’s recent implementation of enhanced security software led to the discovery that a separate sophisticated intruder accessed a limited number of the Lumen’s internal information technology systems, including conducting reconnaissance of these systems, installing malware and extracting a relatively limited amount of data.

According to Lumen, ongoing investigations revealed the incidents will not have material adverse impact on the company’s ability to serve customers or its business, operations or financial results.

Once the incidents were discovered, Lumen followed its long-standing cybersecurity protocols which included working with outside forensic firms to contain the incidents and implementing business continuity plans to restore functionality to its customers’ operational and business systems. In addition, Lumen notified law enforcement and regulatory authorities and impacted customers, launched investigations and took additional steps to safeguard systems.

Following the attacks, Lumen is continuing to assess the potential impact of both events, including whether any personally identifiable or other sensitive information has been exfiltrated. Lumen continues to work with several external advisors, impacted customers and relevant authorities to assess and mitigate the impacts from these incidents.

Cybersecurity leaders weigh in

“Successful ransomware attacks can begin long before victims receive demands from the cybercriminals. These types of attacks start with an initial breach where the threat actor's goal is to establish a foothold in the environment and then do further reconnaissance to locate the victim's critical data,” Dave Martin, Vice President of MDR at Ontinue. “It’s during this initial breach phase that companies have the best chance to stop the attack before it takes hold — possibly limiting it to just a single compromised device or even containing the attack before the threat actor achieves their ultimate objective. However, businesses need to know as soon as possible that a breach has occurred in order to contain it as early in the cyber kill chain as possible. Unfortunately, it’s extremely difficult for businesses — most of which are not cybersecurity experts — to continually monitor for breaches, particularly given the global shortage of cybersecurity talent. Organizations that need assistance addressing ransomware and other cyber threats can get the expertise and responsiveness they need by partnering with a managed detection and response provider. An experienced MDR provider can efficiently and effectively identify and contain cyber threats on the enterprise’s behalf based on a pre-authorized playbook.”

“The first takeaway should be the importance of network segmentation,” said Darren Guccione, CEO and co-founder at Keeper Security. “Network segmentation prevents threat actors from moving laterally within a system should a breach occur, which likely prevented this breach from being as pervasive as it could have been. Network segmentation is a best practice of identity and privileged access management, and is part of the solution that makes it harder for external threat actors to compromise privileged credentials or internal threat actors to misuse them.”

“A major takeaway anytime a ransomware or other cyberattack is reported should be that any enterprise can be targeted,” Guccione continues. “The 2022 U.S. Cybersecurity Census found that IT and security executives expect the number of cyberattacks to continue growing each year. Given the nature of crime, we can expect these threat actors to take the path of least resistance. This means that if the threat actor is able to gain access to a network, the security measures and roadblocks they encounter will play a large factor in whether they continue probing or move on to an easier target.”

Guccione said once a network is connected to the internet, there is no way to outright prevent external attacks from happening. He offered some advice on what enterprises can do to help prevent similar attacks.

“In fact, even preventing system access can be a Herculean task with more than 80 percent of breaches happening from weak or stolen passwords, credentials and secrets, which is why it’s crucial to have the proper cybersecurity protections in place,” Guccione said. “A zero trust security model in conjunction with least-privilege access, role-based access controls (RBAC), a single sign-on (SSO) solution and appropriate password security can greatly decrease the likelihood of a successful attack and stymie the threat actor’s access. By adopting a zero trust framework within their infrastructure, enterprise leaders will be in a stronger position to not only identify and react to attacks on their organization but also mitigate any potential damage.”

Guccione said ransomware attacks are often the result of phishing so it is recommended to utilize a password manager and strong password policies along with employee training to stop attacks on the frontline.

“Phishing attacks to steal passwords and credentials or introduce malware are still prevalent and the more sophisticated attempts can be difficult to spot,” Guccione said. “A password manager can help with identifying malicious URLs if an employee were to click on one of these links. A password manager can also be used to create and store strong, unique passwords for each account, which helps to mitigate password reuse and the accompanying risks.”

KEYWORDS: cyber attack response cyberthreat password management password security ransomware zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Rachelle blairfrasier headshot white

Rachelle Blair-Frasier is Security magazine’s Editor in Chief. Blair-Frasier handles eMagazine features, as well as writes and publishes online news and web exclusives on topics including physical security, risk management, cybersecurity and emerging industry trends. She helps coordinate multimedia content and manages Security magazine's social media presence, in addition to working with security leaders to publish industry insights. Blair-Frasier brings more than 15 years of journalism and B2B writing and editorial experience to the role.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Jason Lau — Top Cybersecurity Leaders 2025

    Jason Lau — Top Cybersecurity Leaders 2025

    See More
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    See More
  • Security’s 2025 Women in Security

    Security’s 2025 Women in Security

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing