Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11:20 AM
Michael Sutton
Michael Sutton

Big Business Ransomware: A Lucrative Market in the Underground Economy

Why lock and/or pilfer a person's files worth hundreds of dollars when corporate data is infinitely more valuable?

Ransomware has hit full stride in 2016. We’re only halfway into the year and we have already experienced a surge of attacks affecting industries from healthcare to critical infrastructure. But ransomware is a threat that’s been around for a while, so why the sudden uptick of attacks?

It’s not that the level of technical sophistication has changed, but because the business model behind ransomware has evolved. Hackers are still using the same old tactics to scare victims into paying to unfreeze their personal files, the difference now is that they’re also expanding into the corporate world. Threatening to hold valuable data hostage, ransomware authors have realized how easily they can gain hundreds of thousands, if not millions of dollars by targeting large organizations. An individual might be limited to a $500 ransom, but how about a manufacturer or a hedge fund? Surely their sensitive data is worth more…

Understanding this evolution of the ransomware business model and its impact on enterprises will be crucial in taking the steps toward warding off such attacks.

The Evolution of Ransomware
Ransomware authors are changing their methods according to their target. It’s no longer the stray individual that is under attack, but corporate PCs, mobile devices and even servers. Why lock and/or pilfer a person’s files worth hundreds when corporate data is infinitely more valuable? Housing extremely sensitive information, organizations from healthcare and financial institutions to retail giants are quick to pay what attackers ask, reinforcing the lucrativeness of big business ransomware.

Now, threat actors are honing their methodology to reap the greatest reward, shying away from random attacks and targeting highly sensitive information in strategic companies. That’s why we’ve witnessed the recent surge in healthcare- and school-related ransomware attacks. Their perceived value and likelihood of storing valuable personally identifiable information (PII) atop these organizations’ tendency to employ outdated security technologies, has made them prime targets.

Adapting to the Change—Staying Safe
It’s disappointing to see how successful ransomware campaigns have been this year. But it’s almost expected when organizations continue using basic signature-based security that hinges on outdated protections like anti-virus tools and traditional security appliances. If history is any indicator, hackers are nimble and have long ago adapted to changing environments by morphing the malware itself so it becomes unrecognizable. It’s time to change how we protect against this.

What enterprises should be doing is moving beyond simple static signature-based and adding dynamic controls that aren’t reliant on identifying a specific attack. Further, backing up sensitive and necessary files should be a must. If companies did so, ransomware would not be the problem it’s become.

The silver lining is that the pain caused by the wave of ransomware attacks has instigated a rapid response to improve security. Ransomware will run its course, just as PoS targeted attacks have started to slip away from the limelight. But that does not mean protection should wane in turn as the threats will persist waiting for those that failed to adapt.

When Will We Stop Feeding into the Underground Economy?
The question now is how long will it take for security practices to adjust? Security has always been a business decision. Some companies would rather pay a lower fee for ransom than pay for the cost of having a robust security stance. But, as hackers continue to ask for higher and higher ransoms, this will have to change. It will reach the point where the ransoms will not be able to get paid off. Then, companies will begin to seek out security measures that will protect their bottom line. I just hope that this change happens much sooner than then.

Related Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada July 30 through Aug. 4, 2016. Click for information on the conference schedule and to register.

Michael Sutton has dedicated his career to conducting leading-edge security research, building world-class security teams and educating others on a variety of security topics. As CISO, Sutton drives internal security and heads Zscaler's Office of the CISO. Zscaler has built ... View Full Bio
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
David Balaban
David Balaban,
User Rank: Strategist
12/8/2016 | 10:07:38 AM
Re: Agreed 100%
I think that hackers are well aware that asking for an exorbitant ransom is not profitable. According to the rules of the market economy, they will raise the rates as long as companies will be willing to pay it. Then they just change the approach.
The fact is that the backup for the corporate companies requires additional resources, namely removable drive with a huge memory. I understand that everyone cannot afford it.
User Rank: Apprentice
7/20/2016 | 1:48:57 PM
Agreed 100%
I couldn't agree with your more Michael.  All types of attacks go through an optimization process whereby the attackers look to maximize their ROI and do so in various manners whether it's via tools and techniques or business optimization, sort of their Go To Market if you will.

The attackers have indeed realized that going after the corporates will yield higher payouts and this shift is felt strongly in various industries.  Unfortunately we've just scratched the surface and the stakes will increase.

Organizations who are not prepared yet to handle this threat should definitely look to do that sooner rather than later.
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-18
A Security Bypass Vulnerability exists in TBOOT before 1.8.2 in the boot loader module when measuring commandline parameters.
PUBLISHED: 2019-11-18
Apache Shiro before 1.4.2, when using the default "remember me" configuration, cookies could be susceptible to a padding attack.
PUBLISHED: 2019-11-18
Cross-site Scripting (XSS) in Jenkins main before 1.482 and LTS before 1.466.2 allows remote attackers to inject arbitrary web script or HTML in the CI game plugin.
PUBLISHED: 2019-11-18
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which m...
PUBLISHED: 2019-11-18
/usr/lib/lua/luci/controller/admin/autoupgrade.lua on PHICOMM K2(PSG1218) V22.5.9.163 devices allows remote authenticated users to execute any command via shell metacharacters in the cgi-bin/luci autoUpTime parameter.