Cyberattacks Can Happen Anytime, Anywhere

Never click on links in an email unless you are absolutely certain they are valid.

The headline was clear and scary: “Cyberattack Hits Administrative Office of Pennsylvania Courts.” The attack disabled online docket sheets and the electronic case document filing portal. Court officials claimed that there was no evidence that the hackers had stolen data.

When you read a little further, you learned a lot of other information, even if the courts did not supply all the details. First, the attack was a denial of service (DOS) attack. That’s not the type of hack we are used to hearing a lot about. More often, we hear about ransomware and malware. But there are many other types of attacks. And, of course, it was disruptive. That presumably was the hacker’s goal.

So, what is a DOS attack? According to CISA, the Cybersecurity and Infrastructure Service Agency (https://cisa.gov), a denial of service cyberattack occurs when an attacker overloads a target with traffic. CISA is the agency charged with protecting the nation’s cyber infrastructure. It is also one of the best resources available for everything you want to know, and more, about cybersecurity.

When a DOS attack occurs, the attacker floods the targeted network with traffic until it cannot respond or simply crashes. As a result, legitimate users are prevented from gaining access to the site. The website cloudshare.com explains that there are two types of DOS attacks: buffer overflow attacks and flood attacks.

A buffer attack causes the attacked system’s memory to use all available disk space, memory, or CPU time. As a result, the site cannot handle all the information and stops functioning. Conversely, a flood attack targets the server with an overwhelming number of packets—a massive volume of small bits of information that floods the server, causing a DOS. Picture one person trying to catch baseballs thrown at him from hundreds of people at the same time.

The attack on the Administrative Office of Pennsylvania Courts (AOPC) was, by contrast, a flood attack. Pennsylvania Supreme Court Chief Justice Debra Todd acknowledged this in a statement released to the public. She termed it a “denial of service” cyberattack. She used the CISA’s description, noting that they “flood the targeted host or network with traffic until the target cannot respond or simply crashes, preventing access for legitimate users.”

Compare this with ransomware, which in essence locks down a computer or computer network until the victim pays a ransom and then, they hope, regains access to the network. Delaware County suffered a ransomware attack in 2021 and paid $25,000 to regain access. While no attack is good, it is often easier to recover from a DOS attack than a ransomware attack.

Second, it appears that the AOPC had a plan for responding to such an attack, implemented the plan, and was transparent. That is best practice for how an attack victim should react. Plan, implement, and be transparent.

Promptly after the attack was discovered and the court knew what was happening, Todd issued a statement providing information about the attack and what was being done in response. She also noted that the “court information technology and executive team continues to work closely with the FBI and Homeland Security to analyze and investigate the cyberattack.” In the event of a cyberattack, the victim should notify the appropriate governmental agencies as soon as possible.

Third, it appears that the DOS attack did not involve any access to information. If it had, the court would likely have indicated that and begun to assess that damage. Like ransomware attacks, if court data is breached, the implications are much greater.

Finally, the court was transparent. And therein lies a lesson for us all. In short, while no one wants to be the victim of a cyberattack, the AOPC’s response helped minimize the ramifications of this one.

What to Do About the Risk

If the courts can be hacked, companies can too. According to the cyberinsurance broker embroder.com, cyberattacks were one of companies’ largest risks in the 2020s and were the “new norm” across public and private sectors. Fifty-seven percent of companies experienced phishing or social engineering attacks; 33 percent experienced attacks via compromised or stolen devices, and 30 percent were attacked through credential theft.

The embroder.com report indicates that the primary cause of successful ransomware attacks was “exploitation of remote access”—i.e., users clicking on links in spam or phishing emails. In other words, the number one cause of ransomware attacks is user error or ignorance, not proactive efforts by cyberhackers. Thus, in most cases, the weakest link is the organization’s staff.

All businesses must have a plan for their reaction when an attack occurs, because it is impossible to prevent every attack. DOS attacks like the AOPC’s, while not 100 percent preventable, can be minimized. CISA recommends taking proactive steps to reduce the impact of an attack on your network. You may also want to use a DOS protection service that will detect abnormal traffic and redirect it away from your network. This makes sense for larger organizations, which are more likely to experience a DOS attack.

Creating a disaster recovery plan helps ensure more efficient communication, mitigation, and recovery in the event of an attack. It bears repeating that there are two types of businesses: those that have been hacked and those that will be.

Fortunately, it is relatively easy to prevent many cyberattacks, with user training being the first and most important line of defense. Firms can hire outside trainers to educate staff. There are also excellent guides that explain how to prevent a ransomware attack.

Most cybersecurity experts agree that taking the following precautions can prevent most attacks:

As the AOPC incident made clear, high-profile sites are targets for hackers. So too are businesses of all sizes. Companies have all types of information that hackers want, including Social Security numbers, financial data, personally identifiable information (PII), and more. It is therefore essential that firms plan for a possible breach.


Daniel J. Siegel, principal of the Law Offices of Daniel J. Siegel and chair of the Pennsylvania Bar Association committee on legal ethics and professional responsibility, provides ethical guidance and Disciplinary Board representation for attorneys and law firms. He is the editor of “Fee Agreements in Pennsylvania” (6th Edition) and author of “Leaving a Law Practice: Practical and Ethical Issues for Lawyers and Law Firms” (First and Second Editions), published by the Pennsylvania Bar Institute. He can be reached at dan@danieljsiegel.com.



From: BenefitsPRO