Ransomware: The Horror Grows
Fotolia

Ransomware: The Horror Grows

As the FBI warned, ransomware has proven to be a formidable threat costing businesses over $1 billion in 2016, averaging 4,000 attacks per day. Ransomware forces victims to choose between losing access to their files or paying a fee that can range between hundreds and thousands of dollars. Ransomware has already made headlines in the first quarter of 2017. 

This Year's Horror Stories

In March, an attack locked Pennsylvania Democratic state senators out of their files. The attack stymied their network access for a week. The leader of the Senate Democrats indicated the files were able to be recovered using backups and noted that they had not paid the ransom.  

Metropolitan Urology Group suffered a data breach as a result of a ransomware attack. Though the company’s computers were infected in November 2016, the company learned of the attack in January this year. The PHI of over 17,500 patients was exposed to the hackers.

An Arkansas water company was hit in February and chose to re-install files from a server backup rather than pay the ransom. The attack encrypted 90,000 files on the server in under two minutes. 

Cockrell Hill Police Department in Texas lost eight years of evidence after a ransomware attack was triggered by someone clicking on a phishing email. The $4,000 ransom wasn't paid. Digital video files and documents were lost, including evidence in ongoing court cases.

An Austrian hotel was the target of a ransomware attack that took over controls to the door locks of the guest rooms until the $1,800 ransom was paid.

A Richmond, Indiana housing agency lost one month of data after a ransomware attack in February. 

A Terrible Evolution

Ransomware is rapidly evolving with 60 new types of ransomware distributed last year. Ransomware kits are sold to make it easy for newbies to enter the game.  Instead of simply encrypting data, some ransomware now also copy the files making data breaches more of a risk.  One new strain permanently encrypts files with no way to recover them. 

Combating Ransomware: Backup + Train

There still is no silver bullet to stop ransomware. Frequent backups and user training are proving to be the best defense against ransomware.

As the cases of the Pennsylvania Senate Democrats and the Arkansas water company have shown, having a recent backup of files puts victims in a better position to not pay the ransom. There is still a loss in terms of time it takes an organization to fully restore files -- the Pennsylvania Democrats lost weeks and the Arkansas Water Company were using handwritten work orders and receipts for several days. Nonetheless, an organization can at least reinstall files from a backup with little loss of data. 

Organizations need to be careful with backups to ensure the ransomware has not infiltrated the backup files as well. The Cockrell Police Department could not rely on their backups because the ransomware had compromised their data long before they realized they had been attacked. They had been backing up defective files for weeks.  Police Chief Stephen Barlag said, “Our automatic backup started after the infection, so it just backed up infected files.”

Most ransomware is deployed via phishing emails (59% according to some studies). Ensuring employees are aware of the dangers of clicking on unfamiliar or suspicious emails and attachments is one of the most effective tools in preventing an attack. While a strong antivirus infrastructure will keep some ransomware at bay, one recent survey indicated that 53% of organizations that were struck by a ransomware attack in the past year had strong security measures in place. Organizations that deployed security tools combined with frequent training and simulations had the lowest percentage of ransomware attacks (21%).

In the rapidly changing climate of ransomware, companies whose employees have been trained to be discerning and know to report suspicious emails to the IT department will have the advantage over the hackers.  

Related Previous Posts

Ransomware: A Cartoon to Brighten More Bad News

Is a Ransomware Attack a HIPAA Data Breach

Ransomware Growing Out of Control

Healthcare’s Ransomware Epidemic

Ransomware on a Rampage

Daniel J. Solove is the John Marshall Harlan Research Professor of Law at George Washington University Law School and the founder of TeachPrivacy, a privacy awareness and security training company. He is the author of 10 books and more than 50 articles. 

Professor Solove's Privacy + Security Training

Some of Our Training Courses Include:

Also check out our Phishing Simulator.

 Who Is Speaking at the Privacy + Security Forum?

Oct. 4-6, 2017 in Washington DC

Professor Solove's Social Media

Please join Professor Solove's Privacy and Data Security LinkedIn Group

Follow Professor Solove on Twitter @DanielSolove.

Sign up for Professor Solove's newsletter. It is free and is only sent out occasionally, so it will not clog your inbox.


Kislay Keshari

Product Marketing @ Pine Labs | SaaS | Fintech | Product | Growth

7 å¹´

They even hamper your files on the drive. They asked for 1.5 Bitcoins for one folder. I had no option, but to format my laptop and the files linked on the drive.

赞
回复
Darshit Varotaria

Security Researcher | SAST | DAST | Secure Code Review | eWPTXv2 | Masters in Information Security

7 å¹´

Start doing backups of your data at regular base in external drives.

赞
回复
Nancy Granai-Sisk

Ascension Seton Med Ctr/ATX Mechanical Circulatory Support Educator, ICCAC Secretary Elect, Cerner EHR orders/doc design & build

7 å¹´

Teslacript 4 (typically a gamer threat) was attached to a Circulation PDF I opened; everything was lost.

赞
回复
Randolph Rosenberg

Cyber Security Strategist and Leader, specialising in Security Architecture, Security Programme Development, VCISO | MSc Information Systems & Software Security, CISSP, CISM

7 å¹´

This is why security training and awareness are so critical to organizations. Phishing is getting rather sophisticated.

Ian Delaney

Owner of INSTAR, the worlds ultimate miniature model paint

7 å¹´

I have read somewhere that Ransomware is relatively easy to solve, it's just the panic factor that makes it so scary, but like any program it can be defeated. If I remember rightly, all you need is access to a second computer to get rid of the program. Also, if your computer has been hit, then you need to look more carefully at emails that contain attachments, especially if you are not expecting them or you don't recognise the sender or the email address looks a little "odd"

赞
回复

要查看或添加评论,请登录

Daniel Solove的更多文章

  • Privacy Scholarship News

    Privacy Scholarship News

    I have a few items of scholarship news to share. SSRN Downloads: A Personal Milestone I’m excited and grateful for this…

    1 条评论
  • U.S. State Privacy Laws: Making Sense of the Mess

    U.S. State Privacy Laws: Making Sense of the Mess

    The year kicked off with several privacy laws coming into effect, and there are several more scheduled to become active…

    8 条评论
  • 2024 Highlights: Privacy and AI Training and Whiteboards

    2024 Highlights: Privacy and AI Training and Whiteboards

    Here’s a roundup of my privacy training and whiteboards in 2024. Training European Union AI Act NIST Privacy Framework…

    5 条评论
  • 2024 Highlights: Privacy and AI Cartoons and Posts

    2024 Highlights: Privacy and AI Cartoons and Posts

    Here’s a roundup of my cartoons and blog posts for 2024. CARTOONS Notice and Choice Personal Data AI Restaurant AI…

    3 条评论
  • 2024 Highlights: Privacy and AI Scholarship

    2024 Highlights: Privacy and AI Scholarship

    Here’s a roundup of my scholarship for 2024. But first, a preview of my forthcoming book (Feb 2025): ON PRIVACY AND…

    3 条评论
  • 2024 Highlights: Privacy and AI Webinars

    2024 Highlights: Privacy and AI Webinars

    Here’s a roundup of my webinars from 2024. Don’t want to miss a video? Please subscribe to my YouTube channel.

    1 条评论
  • What Kafka Can Teach Us

    What Kafka Can Teach Us

    Although Kafka shows us the plight of the disempowered individual, his work also paradoxically suggests that empowering…

    4 条评论
  • The Tyranny of Algorithms

    The Tyranny of Algorithms

    We live today increasingly under the tyranny of algorithms. They rule over us.

    21 条评论
  • FERPA & School Privacy

    FERPA & School Privacy

    When it comes to privacy issues, schools are in the Dark Ages. I cannot think of any other industry that is so far…

    1 条评论
  • Why Individual Rights Can't Protect Privacy

    Why Individual Rights Can't Protect Privacy

    Today, the California Privacy Protection Agency (CPPA) published a large advertisement in the San Francisco Chronicle…

    17 条评论

社区洞察

其他会员也浏览了