Angry About WannaCry?

Angry About WannaCry?

You're yelling at the wrong people.

Following the leak of NSA spying tools by Shadow Brokers in April, the bad guys took that code and modified it slightly to create this variant called WannaCry and spread it to computers around the world.

It is simply one of many forms of malware, and in its present attack style and what is referred to as a “payload type”, it is known as ransomware. Ransomware locks down all the files on an infected computer until the victim is paid the ransom amount.

WannaCry takes advantage of vulnerabilities in Microsoft Windows, which most people do not bother updating with the latest security patches that are designed to protect against attacks like these.  While applying a security patch may appear obvious to an outside observer, the reason companies avoid applying patches is because they create a complicated impact on other systems that depend on Windows.

The failure of companies to update their systems has been a well-known security exposure for years. But, the risk was relatively low before the NSA got sloppy with their secrets.

Now, everyone is at risk and it’s not just businesses. Many consumers with older PCs have disabled their automatic updates due to the annoying nature of re-booting and configuration details that most folks just don’t want to deal with. This is the point at which the notion of self-driving cars makes me smile.

So far, the attack has affected 150 countries, and over 200,000 computers. The impact to hospitals was instructive in that it should provide a peek into what the future might look like. Operations were cancelled, drug delivery was suspended and ambulances were diverted.

Imagine what might happen if the same code were used in a more serious and targeted attempt to disrupt infrastructure operations instead of trying to collect a few bucks from some hapless corporations. Imagine a dam immediately releasing its entire contents or a power grid being shut down for months or air and seaports being closed indefinitely.

Or, perhaps closer to this particular attack, a hospital held ransom against the threat of shutting down all emergency equipment. These are not far-fetched, future-science scenarios. This is very real and very current. People will die.

As you read this, the hackers are firing up new versions of the malware that cyber security organizations will try to detect, counter and eradicate. But, in spite of the billions we spend each year on cybersecurity defense, it is clear who has the upper hand here. In fact, compromises of machines and networks that have already occurred will not yet have been detected, and these existing infections will continue to spread.

You might be asking why this is.

The answer can be found in a combination of complexity, denial and corporate and institutional bureaucracy. The cybersecurity problem is complex. The IT systems at risk are complex. The threats are complex. Most businesses and most consumers have yet to be successfully breached, so not unlike insurance, the cost of protection unless mandated by law, can easily be avoided.

As a result, most businesses tend to ignore the risk they don’t understand and have deferred the expense and trouble of properly securing their IT environments against modern cyber-attacks.

Our government agencies are so heavily siloed to guard against job threatening review that they are virtually impossible to drag into any sensible approach to an over-arching cybersecurity strategy.  The asymmetrical gaps in economics, technology, education and information are the result of our failed approach to dealing with the issues on a national level.

Hackers require very little financial resources to execute a malware attack. $50 on the dark web will get you a malware kit and a service that will even run it for you. You just sit back and collect the bitcoins. Or, watch as the power grid shuts down. Yet protecting against these threats cost us north of $75 billion in 2016. It’s like ringing a doorbell with a Tomahawk missile.

The technology is readily available and super-simple. It gets even simpler when our national intelligence agencies allow it to leak out everywhere. People engaged in cybercrime know everything about the state of our defenses in both the private and public sectors. You don’t have to be a rocket scientist to figure this stuff out. On the other side, we seem to always be surprised at the latest cyberattack.

The bad guys have been studying hacking techniques and approaches for years – both North Korea and Iran have formal educational programs with thousands of skilled graduates operating in the wild. We have nothing close.

But somehow, with all of this in the background, we end up with a presidential order that fails to address any of the fundamental problems, fails to call for any meaningful action, fails to involve anyone in the private sector and calls instead for studies and initiatives and reviews and more analysis and recommendations over the course of a year.

As long as we continue to ignore the threat and take non-steps, the WannaCRy attack will look like child’s play in a couple of months.

?What do we do then? Another study? 

Peter Rus

Innovative enterprise solution/security architect/DORA /CRA /Digital Compliance Strategy/ Ensure successful innovation projects in less time with more value

7 年

Steve King once again a great article.In our opinion there is only one way become cyberresilient .This is an action a study is awareness sesion which in our #dutchdefence is searching for other 80 billions spend on reactive cybersecurity in US federal which are actually now the main cause of attack see the article another app in the wall. want to do something about it? 3 minutes after ransomware attack and the plant is operational replace the guy with the finger in its ear or make him responsible for not looking at alternatives....https://www.dhirubhai.net/pulse/don-qu-iot-te-vs-triple-services-peter-rus-lion

回复

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察

其他会员也浏览了