Attacks/Breaches
6/3/2014
11:45 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Dark Reading Radio: Pay Up Or Never See Your Data Again

Learn how ransomware is raising the stakes, and what law enforcement and the security community are doing about it.

You've heard the horror stories or may have an end-user in your organization whose computer has been held for ransom by cyber criminals who have locked him out of his machine with a nasty form of malware known as ransomware. True to its name, ransomware means you have to pay a fee to get your computer unlocked and freed from these online kidnappers.

But even if you do comply with the ransomware demands and pay up, your data still may be lost to you forever, because these bad guys rarely keep their word.

One of the most deadly and sophisticated forms of ransomware is CryptoLocker, which encrypts the victim's files on local drives and network shares. CryptoLocker uses a strong encryption algorithm to ensure the data is kept out of the victim's reach.

CryptoLocker has been on the radar screen of law enforcement and the security research community for some time now. The FBI yesterday shared the big news that a major global effort by international law enforcement agencies and security companies had disrupted the massive and stealthy botnet that the CryptoLocker gang uses in its operations, GameoverZeus, and that law enforcement had seized key command and control servers used for CryptoLocker. Officials also announced the indictment of the botnet's administrator, a Russian national, for charges of conspiracy, hacking, wire fraud, bank fraud, and money laundering associated with the botnet, as well as other charges for his role in CryptoLocker.

In this next episode of Dark Reading Radio, I'll be hosting Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche, who assisted the FBI with this case. He will provide a peek at his upcoming presentation for Black Hat USA on new research and developments in near-time tracking of the ransomware operation's infrastructure.

James will discuss the impact on ransomware with this latest law enforcement win as well as provide tips for what can be done in the future to defend against ransomware infections.

So register now and join us tomorrow at 1:00 p.m. EDT. Have questions for our guest? Share them in the comments section below, or bring them along to the show tomorrow. We will be taking question from the live audience, and James will join us in a live text chat following the broadcast.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/4/2014 | 7:56:56 AM
It's Dark Reading Radio Day TODAY! Tune in at 1 p.m ET/10 a.m. PT.
Join us for a talk about ransomeware with Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche, who assisted the FBI with the recent CryptoLocker arrest. Be there or be square!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/3/2014 | 3:41:49 PM
Re: Timely Topic! (Mark your calendars for TOMORROW, June 4, 1pm EDT )
I hope Dark Reading Community members take note of the date and time of our Radio Show. I'll repeat it! Wednesday, June 4, 1pm EDT It should be a great conversation with  Lance James and lots of inside information.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
6/3/2014 | 3:38:03 PM
Re: Timely Topic!
I know! Had no idea this would be a breaking news story the week I interview him on his work. Perfect timing indeed. =)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/3/2014 | 3:35:42 PM
Timely Topic!
Very much looking forward to hearing what Lance James has to say about how the FBI cracked this case.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2595
Published: 2014-08-31
The device-initialization functionality in the MSM camera driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, enables MSM_CAM_IOCTL_SET_MEM_MAP_INFO ioctl calls for an unrestricted mmap interface, which all...

CVE-2013-2597
Published: 2014-08-31
Stack-based buffer overflow in the acdb_ioctl function in audio_acdb.c in the acdb audio driver for the Linux kernel 2.6.x and 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges via an application that lever...

CVE-2013-2598
Published: 2014-08-31
app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to overwrite signature-verification code via crafted boot-image load-destination header values that specify memory ...

CVE-2013-2599
Published: 2014-08-31
A certain Qualcomm Innovation Center (QuIC) patch to the NativeDaemonConnector class in services/java/com/android/server/NativeDaemonConnector.java in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.3.x enables debug logging, which allows attackers to obtain sensitive disk-encryption pas...

CVE-2013-6124
Published: 2014-08-31
The Qualcomm Innovation Center (QuIC) init scripts in Code Aurora Forum (CAF) releases of Android 4.1.x through 4.4.x allow local users to modify file metadata via a symlink attack on a file accessed by a (1) chown or (2) chmod command, as demonstrated by changing the permissions of an arbitrary fil...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.