{"id":128094,"date":"2022-09-13T13:04:43","date_gmt":"2022-09-13T13:04:43","guid":{"rendered":"https:\/\/news.microsoft.com\/?p=447070"},"modified":"2022-09-13T13:04:43","modified_gmt":"2022-09-13T13:04:43","slug":"after-a-devastating-cyberattack-the-eastern-band-of-cherokee-indians-became-one-of-the-worlds-most-technologically-advanced-nations","status":"publish","type":"post","link":"https:\/\/sickgaming.net\/blog\/2022\/09\/13\/after-a-devastating-cyberattack-the-eastern-band-of-cherokee-indians-became-one-of-the-worlds-most-technologically-advanced-nations\/","title":{"rendered":"After a devastating cyberattack, the Eastern Band of Cherokee Indians became one of the world\u2019s most technologically advanced nations"},"content":{"rendered":"<p>On a narrow, twisting road in the Great Smoky Mountains, a young woman lost control of her small car in the middle of the night. Her Ford Fiesta careened off the pavement and smashed into a tree.<\/p>\n<p>Despite wearing a seatbelt, the woman was severely injured by the impact and needed urgent help. She was only about 10 minutes from her home in the valley town below, Cherokee, North Carolina, where word of the crash soon reached paramedics.<\/p>\n<p>But there was a big problem in Cherokee, capital of the <a href=\"https:\/\/ebci.com\/\" target=\"_blank\" rel=\"noopener\">Eastern Band of Cherokee Indians (EBCI<\/a>), a federally recognized tribe of more than 16,000 members.<\/p>\n<p>Hours earlier, a ransomware attack against the tribe\u2019s IT infrastructure had knocked the EBCI network offline \u2013 including 911 dispatch and the geolocation system used by paramedics and police officers.<\/p>\n<p>As a result, first responders from Cherokee were forced to spend an extra 18 minutes searching for the driver and her car. By the time they reached her, the woman had died from her injuries. She was 23.<\/p>\n<figure id=\"attachment_31491\" aria-describedby=\"caption-attachment-31491\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-31491 size-large\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/09\/after-a-devastating-cyberattack-the-eastern-band-of-cherokee-indians-became-one-of-the-worlds-most-technologically-advanced-nations.jpg\" alt=\"US-441 in Cherokee, North Carolina\" width=\"995\" height=\"664\"><figcaption id=\"caption-attachment-31491\" class=\"wp-caption-text\">A cyberattack in 2019 knocked 911 dispatch offline, causing a delay in reaching a car accident on this highway.<\/figcaption><\/figure>\n<p>\u201cWould that person have survived (without the delay)? Perhaps. We don\u2019t know,\u201d recalls Richard Sneed, principal chief of the EBCI. \u201cBut the reality is, when there\u2019s an emergency, every minute counts. And when you\u2019re delayed 18 minutes, that\u2019s somebody\u2019s life.\u201d<\/p>\n<p>The attack on Dec. 7, 2019 was the result of vulnerabilities exploited by Russian cybercriminals to encrypt all tribal data. The hackers also left a text file in the victims\u2019 computers, demanding that a ransom be paid to recover the data.<\/p>\n<p>Digital forensics work led tribal police to arrest a former employee, who was alleged to have played a role in increasing those vulnerabilities. A jury later found him guilty of misusing tribal property, a felony. Prosecutors chose not to pursue other charges, including charges specifically related to the 911 outage. He served 454 days in jail.<\/p>\n<p>Some justice was served but the breach inflicted a heavy price. In addition to slowing the search for the injured driver, the EBCI lost a library of irreplaceable Cherokee language audio and video files. Tribal members worked for eight months to fully restore all core services.<\/p>\n<p>Ultimately, the EBCI\u2019s cyber-insurance carrier paid the Russian cybercriminals several hundred thousand dollars in ransom to decrypt the data.<\/p>\n<p>\u201cIt was surreal from start to finish,\u201d Sneed says. \u201cVery much like a movie script.\u201d<\/p>\n<p>Prior to the cyberattack, the EBCI had established a business relationship with Microsoft, but the tribe had implemented only Microsoft Outlook at that time.<\/p>\n<p>The hack prompted EBCI leaders to reevaluate their entire IT infrastructure \u2013 two banks of on-premises servers. After several conversations with Microsoft, they moved their IT system to <a href=\"https:\/\/azure.microsoft.com\/en-us\/\" target=\"_blank\" rel=\"noopener\">Microsoft Azure<\/a> to fortify data security and better prevent future attacks.<\/p>\n<p>To achieve that cloud migration \u2013 and start reestablishing 911 dispatch and other services \u2013 EBCI leaders invited Microsoft cloud solutions architect Elliot Huffman to work onsite at tribal headquarters in Cherokee. He arrived in March 2020.<\/p>\n<p>\u201cAn absolutely beautiful place,\u201d Huffman says. \u201cIt\u2019s a bustling community with small shops and the best views.\u201d<\/p>\n<figure id=\"attachment_31492\" aria-describedby=\"caption-attachment-31492\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-31492 size-large\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/09\/after-a-devastating-cyberattack-the-eastern-band-of-cherokee-indians-became-one-of-the-worlds-most-technologically-advanced-nations-1.jpg\" alt=\"Museum of the Cherokee Indian\" width=\"995\" height=\"664\"><figcaption id=\"caption-attachment-31492\" class=\"wp-caption-text\">The EBCI\u2019s move to the cloud will help preserve crucial pieces of tribal history and culture.<\/figcaption><\/figure>\n<p>The foothills town in Western North Carolina inhabits traditional Cherokee homelands. Once part of the far larger Cherokee nation, the Eastern Band descended from about 800 Cherokee who resisted joining the Trail of Tears \u2013 forced federal displacements of some 60,000 indigenous peoples between 1830 and 1850.<\/p>\n<p>Those EBCI ancestors remained on the original Cherokee homelands, hiding in the North Carolina forests and foothills. During the 1870s, they purchased that same stretch of land, which became known as the Qualla Boundary. Today, the EBCI homeland spans more than 50,000 acres.<\/p>\n<p>The tribe is federally recognized as a sovereign nation with its own laws, elections and governing institutions. But the sophisticated cyberattack decimated that foundation, taking an entire nation offline in one night.<\/p>\n<p>Immediately after the hack, EBCI leaders declared a state of emergency. They contacted the U.S. Cybersecurity and Infrastructure Agency, or CISA, part of the Department of Homeland Security. Meanwhile, the FBI and the North Carolina State Bureau of Investigation helped conduct a criminal investigation.<\/p>\n<p>Still, months of work lay ahead to rebuild the tribe\u2019s IT functions.<\/p>\n<p>\u201cWhen I got there,\u201d Huffman recalls, \u201cthey were basically screaming for help: \u2018We lost everything.\u2019\u201d<\/p>\n<p>The hacker had encrypted every computer with a different key. Those keys were sent back to a command-and-control structure managed by the hacker\u2019s counterparts in Russia. Simply put, the bad guys possessed a database listing of every machine, workstation and server on the EBCI network.<\/p>\n<p>With that database, the criminals built a universal decryption tool, which could be used to reverse the effects of the attacks. After the ransom was paid, EBCI leaders received access to that decryption tool, then went machine by machine to retrieve most of their data.<\/p>\n<p>But one irreversible loss involved the audio and video files of tribal members speaking the Cherokee language. The EBCI had invested 15 years collecting those recordings, which demonstrated the proper enunciation and inflection of Cherokee words, Sneed says.<\/p>\n<p>\u201cThere is a way to speak the language and we\u2019ve only got 160-some fluent speakers left,\u201d Sneed says. \u201cThat data is lost and gone forever. It\u2019s priceless. It carries a long-term cultural impact that I don\u2019t think most people give thought to. It matters.\u201d<\/p>\n<figure id=\"attachment_31493\" aria-describedby=\"caption-attachment-31493\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-31493 size-large\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/09\/after-a-devastating-cyberattack-the-eastern-band-of-cherokee-indians-became-one-of-the-worlds-most-technologically-advanced-nations-2.jpg\" alt=\"Richard Sneed, principal chief of the Eastern Band of Cherokee Indians\" width=\"995\" height=\"663\"><figcaption id=\"caption-attachment-31493\" class=\"wp-caption-text\">Richard Sneed, principal chief of the Eastern Band of Cherokee Indians.<\/figcaption><\/figure>\n<p>The EBCI\u2019s move to the cloud, Sneed says, will help preserve other crucial pieces of tribal history and culture.<\/p>\n<p>In the spring of 2020, Huffman began working side by side with the tribe\u2019s IT employees at the EBCI emergency operations center. They dug into system repairs and, soon, cloud migration.<\/p>\n<p>\u201cWe scrambled to get everything together,\u201d Huffman says.<\/p>\n<p>Their immediate priorities: revive both 911 dispatch and the tribe\u2019s financial system. Twice each year, every EBCI member receives a disbursement of several thousand dollars \u2013 an amount based on revenues from two tribally owned casinos. The cyberattack had delayed those per-capita payments.<\/p>\n<p>Huffman logged about 10 to 12 hours each day on the restoration effort. At night, he stayed at a nearby hotel. Each weekend, he commuted home to South Carolina. During his stay, he learned selected Cherokee words, such as \u201cSgi,\u201d which means \u201cthank you.\u201d<\/p>\n<p>\u201cWe got their most critical things operating first. Then we started tackling other multiple workloads,\u201d Huffman says.<\/p>\n<p>One project was a full tech refresh on the workstations of EBCI government staffers. The tribe purchased $2.1 million worth of <a href=\"https:\/\/www.microsoft.com\/en-us\/surface\" target=\"_blank\" rel=\"noopener\">Microsoft Surface<\/a> laptops for its employees and equipped each with <a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-teams\/group-chat-software\" target=\"_blank\" rel=\"noopener\">Microsoft Teams<\/a>. That enabled employees to work remotely and securely weeks before the COVID-19 pandemic forced social distancing.<\/p>\n<p>\u201cAfter Elliot arrived, we spent some time talking with him and, at that point, we decided we\u2019re all in on the cloud,\u201d recalls Bill Travitz, the tribe\u2019s previous IT director who held the position at the time of the cyberattack. \u201cOnce we made that cloud decision, we never looked back.\u201d<\/p>\n<figure id=\"attachment_31494\" aria-describedby=\"caption-attachment-31494\" class=\"wp-caption aligncenter\"><img decoding=\"async\" loading=\"lazy\" class=\"wp-image-31494 size-large\" src=\"https:\/\/www.sickgaming.net\/blog\/wp-content\/uploads\/2022\/09\/after-a-devastating-cyberattack-the-eastern-band-of-cherokee-indians-became-one-of-the-worlds-most-technologically-advanced-nations-3.jpg\" alt=\"Members of the EBCI IT team.\" width=\"995\" height=\"664\"><figcaption id=\"caption-attachment-31494\" class=\"wp-caption-text\">The EBCI IT Rebuild Team, from left to right: Josh Oliver, Windall Toineeta, Rick Colcord, Doug Chase, Anthony Brown, Michael Lambert and Jeremy Brown.<\/figcaption><\/figure>\n<p>Travitz, a 37-year IT veteran, is a true evangelist for <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\/\" target=\"_blank\" rel=\"noopener\">zero trust<\/a> architecture.<\/p>\n<p>That set of principles is rooted in the doctrine that data security is not merely a perimeter defense but must be viewed in terms of people, services and the movement of data, Travitz says. Under the zero trust umbrella, data is always authenticated and authorized at all available data points, including user identity, location and device health.<\/p>\n<p>In the spring of 2022, Travitz penned an article in <a href=\"https:\/\/www.tribalhub.com\/magazine\/Spring-2022\/\" target=\"_blank\" rel=\"noopener\">TribalNet Magazine<\/a>, titled \u201cThe Holy Grail of Modern Security,\u201d reflecting on the EBCI\u2019s zero trust journey in the Microsoft cloud ecosystem.<\/p>\n<p>\u201cHaving zero trust is such a comfort,\u201d Travitz says. \u201cWe know our security posture is modern. I\u2019m not going to say we\u2019ll never get hacked \u2013 that\u2019s a fool\u2019s errand. But in terms of the damage they could cause, it\u2019s so limited in scope. Now I sleep better at night.\u201d<\/p>\n<p>With the tribe\u2019s IT system hosted in Azure, and further secured by <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/microsoft-sentinel\/\" target=\"_blank\" rel=\"noopener\">Microsoft Sentinel<\/a>, which sees and helps stop threats before they cause harm, the EBCI tech team has \u201cfull visibility into who\u2019s doing what, when and where,\u201d Travitz says.<\/p>\n<p>\u201cThere\u2019s not a soul in that organization who would ever go back to the way it was,\u201d he adds.<\/p>\n<p>After the cloud migration, Travitz often received calls from IT leaders at other U.S. tribes. They asked how the EBCI achieved zero trust architecture. Travitz told them: \u201cIt was our partnership with Microsoft and Elliot being able to build those things out.\u201d<\/p>\n<p>Says Huffman: \u201cThey\u2019re now one of the most technologically advanced sovereign nations and mature governments on the planet from the point of view of cybersecurity and cloud implementation.\u201d He continues to work with the EBCI as needed.<\/p>\n<p>Not long ago, Sneed took his first vacation in about six years, traveling to Mexico for some R&amp;R. Along with some beachwear, the chief took along his laptop to monitor his work emails during the getaway.<\/p>\n<p>But when he tried to read those correspondences, the tribe\u2019s Azure-based IT system stopped him cold.<\/p>\n<p>\u201cAt first, I was mad. But then I was like, \u2018Hey, this is good.\u2019 I was trying to log in from another country and it would not let me access the network, period. I understood the reason why,\u201d Sneed says.<\/p>\n<p>\u201cThis crisis laid bare all the areas we thought were secure, all the shortcomings. Many people probably thought, just like I had, that it would never happen to us.\u201d<\/p>\n<p><em>Photos by Madison Long.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On a narrow, twisting road in the Great Smoky Mountains, a young woman lost control of her small car in the middle of the night. Her Ford Fiesta careened off the pavement and smashed into a tree. Despite wearing a seatbelt, the woman was severely injured by the impact and needed urgent help. She was [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":128095,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[50],"class_list":["post-128094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-news","tag-recent-news"],"_links":{"self":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/128094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/comments?post=128094"}],"version-history":[{"count":0,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/posts\/128094\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media\/128095"}],"wp:attachment":[{"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/media?parent=128094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/categories?post=128094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sickgaming.net\/blog\/wp-json\/wp\/v2\/tags?post=128094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}