Operations
3/9/2016
06:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Two Biggest Reasons Ransomware Keeps Winning

New report also makes predictions on what hijinks ransomware might get up to next.

"2016 will be the year ransomware holds America hostage," because those of us trying to defend against ransomware can't get ourselves organized, according to a new report by the Institute for Critical Infrastructure Technology.

"One reason that ransomware is so effective is that the cybersecurity field is not entirely prepared for its resurgence," wrote researchers. Security applications do not quickly recognize ransomware's maliciousness, because, ransomware itself "effectively acts as a security application. It denies access to data or encrypts the data. The only difference is that the owner of the system does not own the control."

"The other reason that anti-ransomware efforts are stunted," according to the report "is that the opposition is not unified in a response procedure." While security companies mostly advise to never pay ransoms, law enforcement has on times advised to simply pay the ransom when the critical systems or data cannot be recovered by any other means; in fact, some law enforcement agencies have, themselves, paid ransomware operators.

Some might simply say that the cost of the ransom is cheaper than the cost of downtime or lost data. Report authors acknowledge that, but also write somewhat wryly: "Ransomware is effective because it restricts access to information from a society that feels entitled to constant access to information. Many users pay the ransom without exploring alternative options simply because accepting the lost revenue is easier than applying effort."

Although ransom requests for individual machines are generally in the $300 to $500 range, some organizations are paying several thousand dollars at a time to recover systems. The details are not always known, because unlike data breaches, ransomware attacks do not need to be disclosed by law.

The biggest payout in the news recently was the $17,000 ransom paid by Hollywood Presbyterian Hospital last month. It was not the only organization to lose thousands to a ransomware threat though. According to the report, "Horry County school district in South Carolina paid $8,500 to decrypt their 25 servers after an FBI investigation yielded no alternative action." 

The report also cites attacks last month to another county school district, as well as two churches, but predicts "financial institutions are likely the next major sector to be targeted by
ransomware, if their systems have not been infected already."

Researchers also considered the possibility that the two different types of ransomware -- lockers and cryptoransomware -- could be used in tandem. They wrote, "it will be interesting to see if locker ransomware resurges with cryptoransomware running behind the scenes. Layering the types seems unnecessary now, because victims often pay and because neither security researchers nor law enforcement can break the strong encryption used; however, if either of those cultures change, then locker ransomware, which prevents most user action, may return with controls borrowed from crypto ransomware."

Related content:

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
3/11/2016 | 2:54:06 PM
Variance is easily accomplished
The fact that ransomware is easily created and signatures are rendered ineffective once a bit is changed makes it increasingly difficult to defend against. A good way to defend against it is heavy user awareness on what to look for. Preventative instead of corrective action favorable.
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.