Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11:20 AM
Michael Sutton
Michael Sutton

Big Business Ransomware: A Lucrative Market in the Underground Economy

Why lock and/or pilfer a person's files worth hundreds of dollars when corporate data is infinitely more valuable?

Ransomware has hit full stride in 2016. We’re only halfway into the year and we have already experienced a surge of attacks affecting industries from healthcare to critical infrastructure. But ransomware is a threat that’s been around for a while, so why the sudden uptick of attacks?

It’s not that the level of technical sophistication has changed, but because the business model behind ransomware has evolved. Hackers are still using the same old tactics to scare victims into paying to unfreeze their personal files, the difference now is that they’re also expanding into the corporate world. Threatening to hold valuable data hostage, ransomware authors have realized how easily they can gain hundreds of thousands, if not millions of dollars by targeting large organizations. An individual might be limited to a $500 ransom, but how about a manufacturer or a hedge fund? Surely their sensitive data is worth more…

Understanding this evolution of the ransomware business model and its impact on enterprises will be crucial in taking the steps toward warding off such attacks.

The Evolution of Ransomware
Ransomware authors are changing their methods according to their target. It’s no longer the stray individual that is under attack, but corporate PCs, mobile devices and even servers. Why lock and/or pilfer a person’s files worth hundreds when corporate data is infinitely more valuable? Housing extremely sensitive information, organizations from healthcare and financial institutions to retail giants are quick to pay what attackers ask, reinforcing the lucrativeness of big business ransomware.

Now, threat actors are honing their methodology to reap the greatest reward, shying away from random attacks and targeting highly sensitive information in strategic companies. That’s why we’ve witnessed the recent surge in healthcare- and school-related ransomware attacks. Their perceived value and likelihood of storing valuable personally identifiable information (PII) atop these organizations’ tendency to employ outdated security technologies, has made them prime targets.

Adapting to the Change—Staying Safe
It’s disappointing to see how successful ransomware campaigns have been this year. But it’s almost expected when organizations continue using basic signature-based security that hinges on outdated protections like anti-virus tools and traditional security appliances. If history is any indicator, hackers are nimble and have long ago adapted to changing environments by morphing the malware itself so it becomes unrecognizable. It’s time to change how we protect against this.

What enterprises should be doing is moving beyond simple static signature-based and adding dynamic controls that aren’t reliant on identifying a specific attack. Further, backing up sensitive and necessary files should be a must. If companies did so, ransomware would not be the problem it’s become.

The silver lining is that the pain caused by the wave of ransomware attacks has instigated a rapid response to improve security. Ransomware will run its course, just as PoS targeted attacks have started to slip away from the limelight. But that does not mean protection should wane in turn as the threats will persist waiting for those that failed to adapt.

When Will We Stop Feeding into the Underground Economy?
The question now is how long will it take for security practices to adjust? Security has always been a business decision. Some companies would rather pay a lower fee for ransom than pay for the cost of having a robust security stance. But, as hackers continue to ask for higher and higher ransoms, this will have to change. It will reach the point where the ransoms will not be able to get paid off. Then, companies will begin to seek out security measures that will protect their bottom line. I just hope that this change happens much sooner than then.

Related Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Michael Sutton has dedicated his career to conducting leading-edge security research, building world-class security teams and educating others on a variety of security topics. As CISO, Sutton drives internal security and heads Zscaler's Office of the CISO. Zscaler has built ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
David Balaban
David Balaban,
User Rank: Strategist
12/8/2016 | 10:07:38 AM
Re: Agreed 100%
I think that hackers are well aware that asking for an exorbitant ransom is not profitable. According to the rules of the market economy, they will raise the rates as long as companies will be willing to pay it. Then they just change the approach.
The fact is that the backup for the corporate companies requires additional resources, namely removable drive with a huge memory. I understand that everyone cannot afford it.
User Rank: Apprentice
7/20/2016 | 1:48:57 PM
Agreed 100%
I couldn't agree with your more Michael.  All types of attacks go through an optimization process whereby the attackers look to maximize their ROI and do so in various manners whether it's via tools and techniques or business optimization, sort of their Go To Market if you will.

The attackers have indeed realized that going after the corporates will yield higher payouts and this shift is felt strongly in various industries.  Unfortunately we've just scratched the surface and the stakes will increase.

Organizations who are not prepared yet to handle this threat should definitely look to do that sooner rather than later.
US Turning Up the Heat on North Korea's Cyber Threat Operations
Jai Vijayan, Contributing Writer,  9/16/2019
MITRE Releases 2019 List of Top 25 Software Weaknesses
Kelly Sheridan, Staff Editor, Dark Reading,  9/17/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "He's too shy to invite me out face to face!"
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-20
The wp-piwik plugin before 1.0.5 for WordPress has XSS.
PUBLISHED: 2019-09-20
The xpinner-lite plugin through 2.2 for WordPress has xpinner-lite.php XSS.
PUBLISHED: 2019-09-20
The xpinner-lite plugin through 2.2 for WordPress has wp-admin/options-general.php CSRF with resultant XSS.
PUBLISHED: 2019-09-20
On DrayTek Vigor2925 devices with firmware, Incorrect Access Control exists in loginset.htm, and can be used to trigger XSS. NOTE: this is an end-of-life product.
PUBLISHED: 2019-09-20
On DrayTek Vigor2925 devices with firmware, XSS exists via a crafted WAN name on the General Setup screen. NOTE: this is an end-of-life product.