On August 3, 2016, the International Olympic Committee honored eleven victims of the Munich Massacre, a hostage situation during the 1972 Summer Olympics that ended tragically, reminding the world of the high-stake and long-lasting impacts of hostage situations. Ransomware, the malicious software that holds critical data and systems hostage through encryption, has not yet taken human life, but it does evoke similar emotions and endanger human life, especially in the context of critical health data that’s encrypted and lost forever. When a hostage situation strikes, the crisis response is directed and controlled by people acting with limited time, so it’s imperative for organizations to have established relationships with experts to assist before, during, and after emergencies, increasing the likelihood that organizations avoid the tragedies associated with ransomware.
The Floppy Origins¹ of Ransomware
Since 2005, the proliferation of open-source tools for encryption and anonymization have solidified ransomware as a commodity of cybercrime, but the first ransomware was developed twenty-five years ago. The AIDS Trojan, as it came to be known, was malicious software distributed on floppy disks thought to contain information about the disease – instead, it scrambled data and demanded payment be sent to a PO box. Fortunately, security researchers quickly cracked the cipher used to scramble the data and widely distributed it to victims of the AIDS Trojan, minimizing much of the damage. Today’s ransomware is much easier to distribute, more technically sophisticated, and has inflicted greater financial damage to its victims.
The Financial Impact of Today’s Ransomware
The frequency of ransomware attacks has increased sharply, thereby driving up victims’ costs; notably, ransom payments are not the only costs incurred by organizations. By the time an organization recognizes it’s been hit with ransomware, broader questions must be answered, possibly leading to further security, administrative, and legal obligations.
Negotiation is common during ransomware attacks, but don’t trust the attacker. A high-profile ransomware attack on a healthcare institution that initially demanded three million dollars ultimately settled for forty bitcoins (worth $17,000 at the time)².
The FBI recently estimated that the infamous CryptoWall, a variant of ransomware that evolved from CryptoLocker (an earlier version that was interrupted by law enforcement), had accrued over eighteen million in illegal profits. The FBI further reported that in the first quarter of 2016, profits from ransomware grew to two hundred and nine million, driving up estimates to one billion in profits by the end of 2016.
The Executive Starting Point – Handling Hostage Crises
Executives at organizations fend off threats of varying degrees on various fronts (including from competitors). Executives rely on experts to guide their decision making process. Dealing with ransomware attacks is not much different; it requires an awareness of the threat and the prescience to establish proactive relationships with experts that can usher your organization to safety during a crisis. Experts can prepare organizations to avoid ransomware attacks, assist during ransomware attacks, mitigate losses and remediate systems following a ransomware attack, and assist in determining further obligation resulting from an attack.
If you have an expert in place, ask the following FBI-recommended questions³ as a baseline for discussion because the answers will provide insight as to the comprehensive nature of your program:
Backups
|
Application Whitelisting
|
Risk Analysis
|
Incident Response
|
Staff Training
|
Business Continuity
|
Vulnerability Patching
|
Penetration Testing
|
In light of the risks ransomware poses to an organization, early threat assessment, proactive data protection, and comprehensive disaster recovery planning aren’t just smart, they’re essential: essential to the continuation of business, essential to helping stop the commission of cybercrime, and most importantly, essential to the protection of the people the data is meant to serve.
Please direct questions and inquiries about ransomware, cybersecurity, and digital forensics to info@digitalmountain.com.