Ransomware attacks are on the rise. SonicWall reported a 109% increase in ransomware the US during the first half of 2020. Due to relatively low execution costs, high rates of return, and minimal risk of discovery compared with other forms of malware, ransomware has quickly become a preferred method of attack for cybercriminals.
Although computer systems remain the most common source of ransomware infection, Internet of Things (IoT) devices are also prime targets for several reasons, including the fact that hackers know enterprises often have less visibility into these devices, and can therefore inflict devastating effects without detection. In addition, IoT devices are often not built with security in mind, leaving them vulnerable for exploits. IoT-based attacks can also spread across the network very quickly to maximize damage, and ransomware can render the physical functions of that device inaccessible until the ransom is paid.
Unfortunately, there's a lot of finger-pointing when it comes to who is responsible for bolstering IoT security. Often, it's up to individual organizations to protect themselves from IoT-based attacks.
Of all the types of ransomware, one of the most damaging and infamous is WannaCry. It is estimated to have affected more than 200,000 computers across 150 countries, with total damages ranging from hundreds of millions to billions of dollars. WannaCry, as well as other forms of malware and ransomware, leverage a well-known exploit named EternalBlue. It exploits a vulnerability in the Window's Server Message Block version 1 (SMB v1) protocol, which allows the malware to spread to all unpatched Windows systems from XP to 2016 on any network that has this protocol enabled.
Although WannaCry was first detected in May 2017, according to Safety Detectives, it still represents nearly half of all reported ransomware incidents in the US today. All EternalBlue-based malware (including WannaCry) exploits the same Windows vulnerability. Since these attacks are still increasing three years later, it's evident that there are plenty of unpatched Windows systems still out there.
And again, while WannaCry primarily targets computers, IoT devices were not — and are not — immune.
How One Hospital Stopped a WannaCry Attack
In 2019, a European hospital system discovered their ultrasound devices were infected with WannaCry. Several digital imaging and communications in medicine (DICOM) devices were also affected because they were running old versions of MS Windows operating systems. These devices couldn't be patched without breaking the device manufacturer's warranty and, due to the expense of these devices, couldn't easily be replaced.
Fortunately, the hospital acted fast and was able to stop this attack. Specifically, they:
The Road Ahead
Cybersecurity experts all agree that ransomware attacks are only going to accelerate and could represent an increased threat to IoT devices in 2020 and beyond. In addition to protecting your computer systems and company data from the threat of a ransomware attack, it is critical to review and update your current IoT security practices, especially for mission critical endpoints such as medical devices and industrial control systems.
Ransomware isn't going anywhere, but we can make sure we're prepared for the next time it strikes.Ed Koehler has been in the communications and networking industry for 20+ years. Ten of those years he spent as a Senior Technology Architect for R&D within the CTO division of Nortel. His area specialties are, IPv6, Multicast, Digital Identity and Network Security as well as ... View Full Bio