Operations

3/9/2016
06:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Two Biggest Reasons Ransomware Keeps Winning

New report also makes predictions on what hijinks ransomware might get up to next.

"2016 will be the year ransomware holds America hostage," because those of us trying to defend against ransomware can't get ourselves organized, according to a new report by the Institute for Critical Infrastructure Technology.

"One reason that ransomware is so effective is that the cybersecurity field is not entirely prepared for its resurgence," wrote researchers. Security applications do not quickly recognize ransomware's maliciousness, because, ransomware itself "effectively acts as a security application. It denies access to data or encrypts the data. The only difference is that the owner of the system does not own the control."

"The other reason that anti-ransomware efforts are stunted," according to the report "is that the opposition is not unified in a response procedure." While security companies mostly advise to never pay ransoms, law enforcement has on times advised to simply pay the ransom when the critical systems or data cannot be recovered by any other means; in fact, some law enforcement agencies have, themselves, paid ransomware operators.

Some might simply say that the cost of the ransom is cheaper than the cost of downtime or lost data. Report authors acknowledge that, but also write somewhat wryly: "Ransomware is effective because it restricts access to information from a society that feels entitled to constant access to information. Many users pay the ransom without exploring alternative options simply because accepting the lost revenue is easier than applying effort."

Although ransom requests for individual machines are generally in the $300 to $500 range, some organizations are paying several thousand dollars at a time to recover systems. The details are not always known, because unlike data breaches, ransomware attacks do not need to be disclosed by law.

The biggest payout in the news recently was the $17,000 ransom paid by Hollywood Presbyterian Hospital last month. It was not the only organization to lose thousands to a ransomware threat though. According to the report, "Horry County school district in South Carolina paid $8,500 to decrypt their 25 servers after an FBI investigation yielded no alternative action." 

The report also cites attacks last month to another county school district, as well as two churches, but predicts "financial institutions are likely the next major sector to be targeted by
ransomware, if their systems have not been infected already."

Researchers also considered the possibility that the two different types of ransomware -- lockers and cryptoransomware -- could be used in tandem. They wrote, "it will be interesting to see if locker ransomware resurges with cryptoransomware running behind the scenes. Layering the types seems unnecessary now, because victims often pay and because neither security researchers nor law enforcement can break the strong encryption used; however, if either of those cultures change, then locker ransomware, which prevents most user action, may return with controls borrowed from crypto ransomware."

Related content:

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
3/11/2016 | 2:54:06 PM
Variance is easily accomplished
The fact that ransomware is easily created and signatures are rendered ineffective once a bit is changed makes it increasingly difficult to defend against. A good way to defend against it is heavy user awareness on what to look for. Preventative instead of corrective action favorable.
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
The State of IT and Cybersecurity
The State of IT and Cybersecurity
IT and security are often viewed as different disciplines - and different departments. Find out what our survey data revealed, read the report today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12557
PUBLISHED: 2018-06-19
An issue was discovered in Zuul 3.x before 3.1.0. If nodes become offline during the build, the no_log attribute of a task is ignored. If the unreachable error occurred in a task used with a loop variable (e.g., with_items), the contents of the loop items would be printed in the console. This could ...
CVE-2018-12559
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. The mount target path check in mounter.cpp `mpOk()` is insufficient. A regular user can consequently mount a CIFS filesystem anywhere (e.g., outside of the /home directory tree) by passing directory traversal sequ...
CVE-2018-12560
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. Arbitrary unmounts can be performed by regular users via directory traversal sequences such as a home/../sys/kernel substring.
CVE-2018-12561
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. A regular user can inject additional mount options such as file_mode= by manipulating (for example) the domain parameter of the samba URL.
CVE-2018-12562
PUBLISHED: 2018-06-19
An issue was discovered in the cantata-mounter D-Bus service in Cantata through 2.3.1. The wrapper script 'mount.cifs.wrapper' uses the shell to forward the arguments to the actual mount.cifs binary. The shell evaluates wildcards (such as in an injected string:/home/../tmp/* string).