Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

3/9/2016
06:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Two Biggest Reasons Ransomware Keeps Winning

New report also makes predictions on what hijinks ransomware might get up to next.

"2016 will be the year ransomware holds America hostage," because those of us trying to defend against ransomware can't get ourselves organized, according to a new report by the Institute for Critical Infrastructure Technology.

"One reason that ransomware is so effective is that the cybersecurity field is not entirely prepared for its resurgence," wrote researchers. Security applications do not quickly recognize ransomware's maliciousness, because, ransomware itself "effectively acts as a security application. It denies access to data or encrypts the data. The only difference is that the owner of the system does not own the control."

"The other reason that anti-ransomware efforts are stunted," according to the report "is that the opposition is not unified in a response procedure." While security companies mostly advise to never pay ransoms, law enforcement has on times advised to simply pay the ransom when the critical systems or data cannot be recovered by any other means; in fact, some law enforcement agencies have, themselves, paid ransomware operators.

Some might simply say that the cost of the ransom is cheaper than the cost of downtime or lost data. Report authors acknowledge that, but also write somewhat wryly: "Ransomware is effective because it restricts access to information from a society that feels entitled to constant access to information. Many users pay the ransom without exploring alternative options simply because accepting the lost revenue is easier than applying effort."

Although ransom requests for individual machines are generally in the $300 to $500 range, some organizations are paying several thousand dollars at a time to recover systems. The details are not always known, because unlike data breaches, ransomware attacks do not need to be disclosed by law.

The biggest payout in the news recently was the $17,000 ransom paid by Hollywood Presbyterian Hospital last month. It was not the only organization to lose thousands to a ransomware threat though. According to the report, "Horry County school district in South Carolina paid $8,500 to decrypt their 25 servers after an FBI investigation yielded no alternative action." 

The report also cites attacks last month to another county school district, as well as two churches, but predicts "financial institutions are likely the next major sector to be targeted by
ransomware, if their systems have not been infected already."

Researchers also considered the possibility that the two different types of ransomware -- lockers and cryptoransomware -- could be used in tandem. They wrote, "it will be interesting to see if locker ransomware resurges with cryptoransomware running behind the scenes. Layering the types seems unnecessary now, because victims often pay and because neither security researchers nor law enforcement can break the strong encryption used; however, if either of those cultures change, then locker ransomware, which prevents most user action, may return with controls borrowed from crypto ransomware."

Related content:

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
3/11/2016 | 2:54:06 PM
Variance is easily accomplished
The fact that ransomware is easily created and signatures are rendered ineffective once a bit is changed makes it increasingly difficult to defend against. A good way to defend against it is heavy user awareness on what to look for. Preventative instead of corrective action favorable.
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1093
PUBLISHED: 2020-02-21
The init script in the Debian x11-common package before 1:7.6+12 is vulnerable to a symlink attack that can lead to a privilege escalation during package installation.
CVE-2012-0828
PUBLISHED: 2020-02-21
Heap-based buffer overflow in Xchat-WDK before 1499-4 (2012-01-18) xchat 2.8.6 on Maemo architecture could allow remote attackers to cause a denial of service (xchat client crash) or execute arbitrary code via a UTF-8 line from server containing characters outside of the Basic Multilingual Plane (BM...
CVE-2012-0844
PUBLISHED: 2020-02-21
Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.
CVE-2013-3587
PUBLISHED: 2020-02-21
The HTTPS protocol, as used in unspecified web applications, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which makes it easier for man-in-the-middle attackers to obtain plaintext secret values by observing length differences during a series of guesses...
CVE-2012-6277
PUBLISHED: 2020-02-21
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8....