Attacks/Breaches
6/3/2014
11:45 AM
Connect Directly
Google+
Twitter
RSS
E-Mail
100%
0%

Dark Reading Radio: Pay Up Or Never See Your Data Again

Learn how ransomware is raising the stakes, and what law enforcement and the security community are doing about it.

You've heard the horror stories or may have an end-user in your organization whose computer has been held for ransom by cyber criminals who have locked him out of his machine with a nasty form of malware known as ransomware. True to its name, ransomware means you have to pay a fee to get your computer unlocked and freed from these online kidnappers.

But even if you do comply with the ransomware demands and pay up, your data still may be lost to you forever, because these bad guys rarely keep their word.

One of the most deadly and sophisticated forms of ransomware is CryptoLocker, which encrypts the victim's files on local drives and network shares. CryptoLocker uses a strong encryption algorithm to ensure the data is kept out of the victim's reach.

CryptoLocker has been on the radar screen of law enforcement and the security research community for some time now. The FBI yesterday shared the big news that a major global effort by international law enforcement agencies and security companies had disrupted the massive and stealthy botnet that the CryptoLocker gang uses in its operations, GameoverZeus, and that law enforcement had seized key command and control servers used for CryptoLocker. Officials also announced the indictment of the botnet's administrator, a Russian national, for charges of conspiracy, hacking, wire fraud, bank fraud, and money laundering associated with the botnet, as well as other charges for his role in CryptoLocker.

In this next episode of Dark Reading Radio, I'll be hosting Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche, who assisted the FBI with this case. He will provide a peek at his upcoming presentation for Black Hat USA on new research and developments in near-time tracking of the ransomware operation's infrastructure.

James will discuss the impact on ransomware with this latest law enforcement win as well as provide tips for what can be done in the future to defend against ransomware infections.

So register now and join us tomorrow at 1:00 p.m. EDT. Have questions for our guest? Share them in the comments section below, or bring them along to the show tomorrow. We will be taking question from the live audience, and James will join us in a live text chat following the broadcast.

Kelly Jackson Higgins is Senior Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise Magazine, ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/3/2014 | 3:35:42 PM
Timely Topic!
Very much looking forward to hearing what Lance James has to say about how the FBI cracked this case.
Kelly Jackson Higgins
100%
0%
Kelly Jackson Higgins,
User Rank: Strategist
6/3/2014 | 3:38:03 PM
Re: Timely Topic!
I know! Had no idea this would be a breaking news story the week I interview him on his work. Perfect timing indeed. =)
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/3/2014 | 3:41:49 PM
Re: Timely Topic! (Mark your calendars for TOMORROW, June 4, 1pm EDT )
I hope Dark Reading Community members take note of the date and time of our Radio Show. I'll repeat it! Wednesday, June 4, 1pm EDT It should be a great conversation with  Lance James and lots of inside information.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
6/4/2014 | 7:56:56 AM
It's Dark Reading Radio Day TODAY! Tune in at 1 p.m ET/10 a.m. PT.
Join us for a talk about ransomeware with Lance James, renowned security expert and head of cyber intelligence at Deloitte & Touche, who assisted the FBI with the recent CryptoLocker arrest. Be there or be square!
More Blogs from Commentary
Weak Password Advice From Microsoft
Tempting as it may seem to do away with strong passwords for low-risk websites, password reuse is still a significant threat to both users and business.
Internet of Things: 4 Security Tips From The Military
The military has been connecting mobile command posts, unmanned vehicles, and wearable computers for decades. Itís time to take a page from their battle plan.
Passwords Be Gone! Removing 4 Barriers To Strong Authentication
As biometric factors become more prevalent on mobile devices, FIDO Alliance standards will gain traction as an industry-wide authentication solution.
RAM Scraper Malware: Why PCI DSS Can't Fix Retail
There is a gaping hole in the pre-eminent industry security standard aimed at protecting customers, credit card and personal data
Dark Reading Radio: The Winners & Losers of Botnet Takedowns
Our guests are Cheri McGuire, VP of global government affairs and cyber security policy for Symantec, and Craig D. Spiezle, executive director and founder of the Online Trust Alliance.
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.