Why We Will Lose The Ransomware War Too.

Why We Will Lose The Ransomware War Too.

We all know that Ransomware is the celebrity malware dujour and we have all read about the various responses from medical centers and hospitals who have largely been the primary targets of the recent attack wave.

Now, we have the results of a survey conducted through Spiceworks, an IT community with over a million members, mostly small and medium sized business IT managers and administrators.

They were asked whether they had been victims of ransomware, how they responded, or if not yet hit, how they thought they would respond, and how the threat of ransomware had affected their jobs and their organizations.

The most common theme was not surprisingly, the immediacy of the event/response cycle. The majority of survey respondents said they were aware they had been compromised within an hour of the event and 9 out of 10 said they were aware of the attack within 24 hours.

Unlike traditional data breaches, where the average time of discovery tales months, ransomware attacks are (in their present form) almost immediate; you’re locked down and/or your data is inaccessible and/or encrypted and useless.

What you are supposed to do is pay up and then get your key so you can begin recovering. What the survey said instead was that most respondents began isolating the infection and starting a restoration process. This is interesting, because today’s ransom malware almost never affects a single machine or set of files.

The other surprising response was that the vast majority said they refuse or would refuse to pay the ransom. Surprising because the FBI has most recently recommended paying the ransom* and most of the affected hospital administrators have responded to ransom attacks by paying as well.

The survey respondents were overwhelmingly certain that paying would not yield the restoration keys so the data would be lost anyway and they had sufficient backups from which to recover.

It turns out however that among actual victims of ransomware attacks, only 42% were able to fully recover their data and that the typical restoration when they could recover fell short by as much as 24 hours of lost data.

I would say surprisingly, but I am rarely surprised these days, that when these IT administrators were asked to describe the process changes they had made to their security following a ransomware attack, less than 10% of the victims said they had changed their backup strategies.

Instead, most had implemented increased restrictions on data access and phishing/social engineering training to improve user awareness.

This survey is depressing.

The takeaway is that we have a bunch of IT “professionals” who are focused on the rear-view mirror, refusing to understand the actual natures of the current and future ransomware threat profiles, ignore the obvious necessity of well-designed and frequent off-line backup procedures, and try to move the problem back to the users.

There was not a single comment about attack rehearsals, policy regarding ransomware demands and payment, recovery and restoration drills and protocols or organizational communications processes and targets.

The attempt to move the problem to the users is disturbing because we know that the future (as in next week) strains of ransomware are going to penetrate networks and backup protocols without regard to or assistance from any users whatsoever. What good will improved user awareness do then I wonder?

The survey respondents did say they wanted new tools to help detect ransomware, and they said they wanted to be able to recover without paying the ransom.

Yeah, and I would like to be having a cocktail at the Kamalame Cay Resort in the Bahamas right now too, but that ain’t happening either.

To assume that tools to detect and prevent will magically appear and that somehow software will figure out how to stop these attacks anytime soon is just plain silly.

The reality is that ransomware is going to be around for a long time, it will morph to become deadlier than a few locked files and it will become much more difficult to detect. The future holds not just useless data, but useless backups, not just frozen assets but compromised controls on operational medical devices, not just a few hundred or thousand dollars but millions.

Not just data but actual human lives.

So, we need to bite a big bullet. We need to segregate our networks, move our IoT devices to shielded grids, move our backups offline, invest in network behavioral analytics systems, install microVMs on every endpoint, create new and protected networks for medical devices in hospitals, kill all the BYOD programs and invest time and energy in policy and protocols for conditional responses. Oh and sure, continue raising awareness in the user community about what a phishing attack looks like and how social engineering works.

If we don’t, we should not be surprised that the frequency, volume and complexity of ransomware attacks will increase, the size of the demands will start resembling real money and people’s lives will be put at risk.

All unnecessarily.

At the end of October last year, while giving a presentation at the Cyber Security Summit in Boston, Joseph Bonavolonta, Assistant Special Agent in Charge of the FBI’s Cyber and Counterintelligence Program, disclosed some details about how the FBI handled companies and individuals that were infected with crypto-ransomware.

Mr. Bonavolonta said that, in most cases, because the FBI can't help these companies recover files, their agents often end up recommending them to pay the ransom to get their data back.

Simon Hunt

Dedicated to stopping cybercriminals. Inventor. Mentor. Optimizer of products and processes. GM | CTO | CPO

8 年

Ransomware plays on our inability to convince "users" that having rights to install/run any program and make any system change they please is not in their best interests. "With great power, comes great responsibility" - ie you'll loose all your data.

回复
Antonio Chan

Cybersecurity and Data Privacy Expert

8 年

In addition to biting the big bullet, rights and access-management and threat intelligence needs to be spot on. Missed it in this article. If we all pay the ransom, where will it end? A million bitcoins?

回复
Dave Howe

Carefully standardized Reference Geek at ANS Group Plc; JOAT and penguin farmer

8 年

Paying the ransom is often cheaper than recovering without paying, and even if that were equal, recovery leaves a company without IT resources for longer - so it is in the interests of *your* company that they do pay, but in the interests of *my* company that you don't....

回复
Manu V.

Senior Security Lead @ Victoria's Secret | SOC Architect | Cyber security strategy

8 年

Hi, Good article ! Restricting unwanted emails to Org network also will help this menace out of your way since most of the ransomware attacks were initiated through malicious emails from unknown. Also access restrictions to the file servers and critical servers.

回复
Craig Kensek

Strategy | Corporate Marketing | Product Marketing | Marketing Management | Director | Communication | Cybersecurity

8 年

IT personnel who pay the ransom and make cosmetic changes to their company's security profile should be let go.

回复

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察