Attacks/Breaches
6/3/2014
11:45 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Dark Reading Radio: Pay Up Or Never See Your Data Again

Learn how ransomware is raising the stakes, and what law enforcement and the security community are doing about it.

You've heard the horror stories or may have an end-user in your organization whose computer has been held for ransom by cyber criminals who have locked him out of his machine with a nasty form of malware known as ransomware. True to its name, ransomware means you have to pay a fee to get your computer unlocked and freed from these online kidnappers.

But even if you do comply with the ransomware demands and pay up, your data still may be lost to you forever, because these bad guys rarely keep their word.

One of the most deadly and sophisticated forms of ransomware is CryptoLocker, which encrypts the victim's files on local drives and network shares. CryptoLocker uses a strong encryption algorithm to ensure the data is kept out of the victim's reach.

CryptoLocker has been on the radar screen of law enforcement and the security research community for some time now. The FBI yesterday shared the big news that a major global effort by international law enforcement agencies and security companies had disrupted the massive and stealthy botnet that the CryptoLocker gang uses in its operations, GameoverZeus, and that law enforcement had seized key command and control servers used for CryptoLocker. Officials also announced the indictment of the botnet's administrator, a Russian national, for charges of conspiracy, hacking, wire fraud, bank fraud, and money laundering associated with the botnet, as well as other charges for his role in CryptoLocker.

In this next episode of Dark Reading Radio, I'll be hosting Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche, who assisted the FBI with this case. He will provide a peek at his upcoming presentation for Black Hat USA on new research and developments in near-time tracking of the ransomware operation's infrastructure.

James will discuss the impact on ransomware with this latest law enforcement win as well as provide tips for what can be done in the future to defend against ransomware infections.

So register now and join us tomorrow at 1:00 p.m. EDT. Have questions for our guest? Share them in the comments section below, or bring them along to the show tomorrow. We will be taking question from the live audience, and James will join us in a live text chat following the broadcast.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/4/2014 | 7:56:56 AM
It's Dark Reading Radio Day TODAY! Tune in at 1 p.m ET/10 a.m. PT.
Join us for a talk about ransomeware with Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche, who assisted the FBI with the recent CryptoLocker arrest. Be there or be square!
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/3/2014 | 3:41:49 PM
Re: Timely Topic! (Mark your calendars for TOMORROW, June 4, 1pm EDT )
I hope Dark Reading Community members take note of the date and time of our Radio Show. I'll repeat it! Wednesday, June 4, 1pm EDT It should be a great conversation with  Lance James and lots of inside information.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
6/3/2014 | 3:38:03 PM
Re: Timely Topic!
I know! Had no idea this would be a breaking news story the week I interview him on his work. Perfect timing indeed. =)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/3/2014 | 3:35:42 PM
Timely Topic!
Very much looking forward to hearing what Lance James has to say about how the FBI cracked this case.
More Blogs from Commentary
Phishing: What Once Was Old Is New Again
I used to think the heyday of phishing had passed. But as Symantec notes in its 2014 Internet Security Threat Report, I was wrong!
Dark Reading Radio: Data Loss Prevention (DLP) Fail
Learn about newly found vulnerabilities in commercial and open-source DLP software in the 7/30 episode of Dark Reading Radio.
The Perfect InfoSec Mindset: Paranoia + Skepticism
A little skeptical paranoia will ensure that you have the impulse to react quickly to new threats while retaining the logic to separate fact from fiction.
Weak Password Advice From Microsoft
Tempting as it may seem to do away with strong passwords for low-risk websites, password reuse is still a significant threat to both users and business.
Internet of Things: 4 Security Tips From The Military
The military has been connecting mobile command posts, unmanned vehicles, and wearable computers for decades. It’s time to take a page from their battle plan.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0914
Published: 2014-07-30
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management f...

CVE-2014-0915
Published: 2014-07-30
Multiple cross-site scripting (XSS) vulnerabilities in IBM Maximo Asset Management 6.2 through 6.2.8, 6.x and 7.1 through 7.1.1.2, and 7.5 through 7.5.0.6; Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk; and Maximo Asset Management 6.2 through 6.2.8...

CVE-2014-0947
Published: 2014-07-30
Unspecified vulnerability in the server in IBM Rational Software Architect Design Manager 4.0.6 allows remote authenticated users to execute arbitrary code via a crafted update site.

CVE-2014-0948
Published: 2014-07-30
Unspecified vulnerability in IBM Rational Software Architect Design Manager and Rational Rhapsody Design Manager 3.x and 4.x before 4.0.7 allows remote authenticated users to execute arbitrary code via a crafted ZIP archive.

CVE-2014-2356
Published: 2014-07-30
Innominate mGuard before 7.6.4 and 8.x before 8.0.3 does not require authentication for snapshot downloads, which allows remote attackers to obtain sensitive information via a crafted HTTPS request.

Best of the Web
Dark Reading Radio