Ransomware: The Horror Grows
Daniel Solove
Professor, GW Law School + CEO, TeachPrivacy + Organizer, Privacy+Security Forum
As the FBI warned, ransomware has proven to be a formidable threat costing businesses over $1 billion in 2016, averaging 4,000 attacks per day. Ransomware forces victims to choose between losing access to their files or paying a fee that can range between hundreds and thousands of dollars. Ransomware has already made headlines in the first quarter of 2017.
This Year's Horror Stories
In March, an attack locked Pennsylvania Democratic state senators out of their files. The attack stymied their network access for a week. The leader of the Senate Democrats indicated the files were able to be recovered using backups and noted that they had not paid the ransom.
Metropolitan Urology Group suffered a data breach as a result of a ransomware attack. Though the company’s computers were infected in November 2016, the company learned of the attack in January this year. The PHI of over 17,500 patients was exposed to the hackers.
An Arkansas water company was hit in February and chose to re-install files from a server backup rather than pay the ransom. The attack encrypted 90,000 files on the server in under two minutes.
Cockrell Hill Police Department in Texas lost eight years of evidence after a ransomware attack was triggered by someone clicking on a phishing email. The $4,000 ransom wasn't paid. Digital video files and documents were lost, including evidence in ongoing court cases.
An Austrian hotel was the target of a ransomware attack that took over controls to the door locks of the guest rooms until the $1,800 ransom was paid.
A Richmond, Indiana housing agency lost one month of data after a ransomware attack in February.
A Terrible Evolution
Ransomware is rapidly evolving with 60 new types of ransomware distributed last year. Ransomware kits are sold to make it easy for newbies to enter the game. Instead of simply encrypting data, some ransomware now also copy the files making data breaches more of a risk. One new strain permanently encrypts files with no way to recover them.
Combating Ransomware: Backup + Train
There still is no silver bullet to stop ransomware. Frequent backups and user training are proving to be the best defense against ransomware.
As the cases of the Pennsylvania Senate Democrats and the Arkansas water company have shown, having a recent backup of files puts victims in a better position to not pay the ransom. There is still a loss in terms of time it takes an organization to fully restore files -- the Pennsylvania Democrats lost weeks and the Arkansas Water Company were using handwritten work orders and receipts for several days. Nonetheless, an organization can at least reinstall files from a backup with little loss of data.
Organizations need to be careful with backups to ensure the ransomware has not infiltrated the backup files as well. The Cockrell Police Department could not rely on their backups because the ransomware had compromised their data long before they realized they had been attacked. They had been backing up defective files for weeks. Police Chief Stephen Barlag said, “Our automatic backup started after the infection, so it just backed up infected files.â€
Most ransomware is deployed via phishing emails (59% according to some studies). Ensuring employees are aware of the dangers of clicking on unfamiliar or suspicious emails and attachments is one of the most effective tools in preventing an attack. While a strong antivirus infrastructure will keep some ransomware at bay, one recent survey indicated that 53% of organizations that were struck by a ransomware attack in the past year had strong security measures in place. Organizations that deployed security tools combined with frequent training and simulations had the lowest percentage of ransomware attacks (21%).
In the rapidly changing climate of ransomware, companies whose employees have been trained to be discerning and know to report suspicious emails to the IT department will have the advantage over the hackers.
Related Previous Posts
Ransomware: A Cartoon to Brighten More Bad News
Is a Ransomware Attack a HIPAA Data Breach
Ransomware Growing Out of Control
Healthcare’s Ransomware Epidemic
Daniel J. Solove is the John Marshall Harlan Research Professor of Law at George Washington University Law School and the founder of TeachPrivacy, a privacy awareness and security training company. He is the author of 10 books and more than 50 articles.
Professor Solove's Privacy + Security Training
Some of Our Training Courses Include:
- 5 Key Points for Data Security
- Avoiding Phishers, Hackers and Social Engineers
- Phishing
- Data Security Training Program
- Social Engineering
- Humans are the Biggest Data Security Risk
- Social Engineering: Spies and Sabotage
- Spot the Risks: Privacy and Cybersecurity Game
- Malware
- Vignette — Ransomware Attack
Also check out our Phishing Simulator.
Who Is Speaking at the Privacy + Security Forum?
Oct. 4-6, 2017 in Washington DC
Professor Solove's Social Media
Please join Professor Solove's Privacy and Data Security LinkedIn Group
Follow Professor Solove on Twitter @DanielSolove.
Sign up for Professor Solove's newsletter. It is free and is only sent out occasionally, so it will not clog your inbox.
Product Marketing @ Pine Labs | SaaS | Fintech | Product | Growth
7 å¹´They even hamper your files on the drive. They asked for 1.5 Bitcoins for one folder. I had no option, but to format my laptop and the files linked on the drive.
Security Researcher | SAST | DAST | Secure Code Review | eWPTXv2 | Masters in Information Security
7 å¹´Start doing backups of your data at regular base in external drives.
Ascension Seton Med Ctr/ATX Mechanical Circulatory Support Educator, ICCAC Secretary Elect, Cerner EHR orders/doc design & build
7 å¹´Teslacript 4 (typically a gamer threat) was attached to a Circulation PDF I opened; everything was lost.
Cyber Security Strategist and Leader, specialising in Security Architecture, Security Programme Development, VCISO | MSc Information Systems & Software Security, CISSP, CISM
7 å¹´This is why security training and awareness are so critical to organizations. Phishing is getting rather sophisticated.
Owner of INSTAR, the worlds ultimate miniature model paint
7 å¹´I have read somewhere that Ransomware is relatively easy to solve, it's just the panic factor that makes it so scary, but like any program it can be defeated. If I remember rightly, all you need is access to a second computer to get rid of the program. Also, if your computer has been hit, then you need to look more carefully at emails that contain attachments, especially if you are not expecting them or you don't recognise the sender or the email address looks a little "odd"