Subscribe to RSS  |  Advertise on this Blog

  • HOME
  • ABOUT
    • RESUME
Alberto Matus
  • SERVICES
  • CONTACT
  • HOME
  • ABOUT
    • RESUME
  • SERVICES
  • CONTACT
October 12, 2017  |  By ajMatus In Cybersecurity, Technology

What is Ransomware?

Technologies are fast changing the way we interact with every aspect in our everyday lives, and with these changes there is a need for assurance and security. However, as Sullivan (n.d) noted that just as pollution was a side effect of the industrial revolution, so are the many security vulnerabilities that come with increased internet connectivity. Cyber security experts keep creating new defense methods, and counter measures to defend users and organizations in cyber space. Similarly, attackers introduce new threats and penetration methods that affect end users. One of those cyber-attacks that seeks to exploit end node vulnerabilities is ransomware. Trend Micro (n.d) defines ransomware as a type of malicious software that prevents or limits users from accessing their system, either by locking the system’s screen or by locking user’s files unless a ransom is paid. More modern types of ransomware are categorized as crypto-ransomware because they use strong encryption methods to intentionally encrypt end user or organization system files. In order to attain the decryption key the ransom is demanded. Ransomware has quickly emerged as one of the most dangerous threats in cyber security, losses from both individuals and organizations are in millions due to this type of attack. We’re no longer only vulnerable to only human hostage situations, but even our technological gadgets can be put into the same situation.

History

While attacks of ransomware are fully swinging in most recent years causing losses in millions of dollars, it is to be noted that the first ransomware attack occurred in 1989. Palo Alto Networks (2016) reports that a PhD AIDS researcher Dr. Joseph Popp distributed over 20,000 floppy disks to other fellow researchers in a variety of other countries. This was done with the excuse of having a questionnaire in the floppy disks that would pertain to AIDS research. However, Dr. Popp infected the disks with a malware. It would count the number of times a PC was booted and when the counter reached 90 it would encrypt the directories and hide file names on the C drive. At that point it would display a ransom note demanding cash payment to be paid to a post box office in Panama in order to attain a “software lease” that would later give access to the files. This later became known as the digital version of the AIDS virus.

Today’s Security Issues

While the AIDS virus may have seemed trivial at the time, this is what laid out the foundation for the current sophisticated ransomware malicious software. Today’s cyber criminals are more sophisticated than ever, these are next generation attacks which require next generation solutions. They are now using sophisticated encryption methods that are impossible in most cases to decrypt. TrendMicro (2016) reported that the year of 2016 would be the year of online extortion. The AIDS virus with its initial concept has given rise to powerful ransomware software such as the following:

Jigsaw – This deletes the files whenever the victim fails to pay the ransom in the given amount of time as the deadline.
Surprise – Instead of deleting the files the ransom increases after each initial payment deadline is not met.
Keyranger – Take the form of Mac OSX applications, but behind it lies the power of ransomware.
Tesla Crypt – Use AES encryption algorithms to encrypt the files.
ZCryptor – Self propagating malware strain exhibiting worm like behavior that has the capabilities to encrypt external drives in order to replicate in other machines to which they are connected.

These are but a few of the many forms or ransomware, each unique in its own way but with the very same purpose to infiltrate and extort. Symantec (2016) also further notes that over the past year ransomware has gained additional instruments to back up their power arsenal. They have figured ways to be encoded in different programming languages such as PHP, PowerShell, Python, JavaScript and more. Additionally new versions of ransomware have extended their functionalities which go beyond locking or encrypting devices. Newer versions such as the Trojan Cryptolocker.AN has the ability to gather bitcoin wallet data and send it to the attackers, some threaten to post victim files on the web, while others can use the end notes to carry out distributed denial of service attacks.

Intermedia (2016) states that this threat is going nowhere, instead it is only bound to get more dangerous as the years go by. This is in part because of two main reasons, firstly due to the increase of processing powers of computers today. Our computers are so powerful now that they can encrypt their own files in a matter of hours, and as such any well written piece of code that is there to do harm will ensure to accomplish it in a matter of hours or less. Secondly, it is a growth industry that is on the rise due to anonymous payment systems such as that of bitcoin. Payments are no longer demanded as it was in the case of the AIDS virus through a PO Box address. Instead these anonymous online payment systems allow criminals to accept payments without the hurdles or fears of being traced. The market for holding hostage one’s technologies along with important data are here to stay.

Why be Concerned?

In 2016 alone ransomware can be seen as becoming more prevalent (see Appendix A for growth of encryption ransomware). One of the main reasons that ransomware has become so prevalent and effective is because of the extortions and the cost of time being lost by victims. Once an end user is targeted, their files, documents and even complete systems are compromised until they are able to pay a ransom or miraculously find a way out. Attackers normally dig rigorously and find valuable data on these systems and then further initiate their intended attacks. If global giants such as Microsoft can be attacked as in the case of this year by the Cerber ransomware then we should all be concerned (Olenick,2016). Attacks on a networked system such as Microsoft’s should concern us because it can simply jump from system to system and potentially take out entire networks.

Furthermore, with the advancements in their malicious code developments such as the ransomware32 being the first JavaScript version of its kind in 2016, means that more users are vulnerable (Abrams, 2016). If users can be affected on personal computers, bigger companies are more compromised, because the advancements allow for servers, backups and mobile devices to be compromised by its weakest link in the chain; the end user. The inevitable fact that a business affected by ransomware will be unable to function properly should raise awareness and countermeasures to the table. We should all consider what would happen if data would lost indefinitely, how customers/clients would react if the data lost would be crucial to their daily lives, and especially if it was confidential.Ransomware touches all these aspects and more.

Stanfield (2016) depicts a very important statistic: New research from Trend Micro in the UK has revealed some alarming figures. According to the report, 44 percent of UK businesses have been hit with a ransomware attack in the last two years, with some and nearly two-thirds of those businesses end up paying the ransom to try and reclaim their data. However, the report also claims that of those businesses that paid ransom money to their attackers, 1 in 5 never got the data back. Another worrying statistic from the report is that businesses lost on average 33 man hours dealing with and resolving the effects of a ransomware attack.

Implications & Observations

Based upon the severity that ransomware has upon individual users and organizations the following can be said:

The true cost of ransomware is employee downtime. Intermedia (2016) conducted a survey of about 300 It experts in regards to the cyber security threat ransomware. These included experts who deal on a day to day basis with different organization types, sizes, locations and more. Despite what one would believe that the true nature of attack is the severity of payment, their survey proved otherwise. Many of these organizations try to fix the problem with their IT personnel, only to later find out that the ransom has increased due to time. Additionally, the time lost is never recoverable costing the organizations in many cases millions of dollars due to employee downtime. The same can be said for individual users who rely on their technological devices to produce an output for their earnings.
The downtime for employees last for days. In the event of an attack there’s always the need to immediately take action on the infected machine. However, while many await directions of whether to pay or not the ransom this typically goes for hours if not days. Even in the event that they do decide to make payments then the IT personnel are tasked to create new counter measures on their systems, inspections of files, restoration of files, and cleaning up of systems. This usually lasts for days which again results in losses. Intermedia (2016) reports that 52% of the experts took two or more days for restorations, another 19% who paid the ransom still did not get their files which is even worse.
Ransomware is targeting bigger businesses and spreading within corporate networks. Realizing that bigger business has higher potential for profits, these cyber criminals are now targeting bigger businesses and launching attacks on corporate networks. These involve high level technical experiences by the attackers, and cyber espionage like attacks which is more time consuming but once successful they know that a very suitable profitable return is most likely in the works. This is the current trend that will overtake the future target markets of ransomware attackers. A prime example is explained in the section below, if an entity which such crucial data such as that of a hospital can be extorted, then businesses are without a doubt the next markettrend.

Mogg (2016) indicates that the Hollywood Presbyterian Medical Center is a perfect example of what ransomware can do. February 5 th of 2016 they were attacked by ransomware due to their level of importance and high data integrity that they contain. Their original idea was to take their computers offline to perform data restoration and cleaning on their systems. Eventually the hospital was now working simply on data charts, pen and paper, and fax machines for over a week while the IT personnel tried their best. At the same time there was severe employee downtime, and in critical cases patients had to be rushed to other nearby hospitals due to the non operational level of the hospital. Additional, patient records and important data were non accessible. BBC news, New York Times covered the story as it progressed and eventually their IT personnel had to give up. The hospital was forced to pay $17,000 in bitcoins to the attackers to avoid more down time and financial losses. Even after that, they still ended up inspecting the data integrity and spending fortunes on security systems up to today. This shows the true nature of the severity of what ransomware can do. No one is safe when it comes to cyber security threats, we can all be victims on cyberspace no matter how important we think we are. That is why there is a need for prevention techniques, informational training for employees in order for them to be aware, and a need for counter measures as a whole. Otherwise, the losses such as in the case of this hospital can even turn out to be fatal for patients that depend on the information systems.

Countermeasures

In order to have counter measures we must first understand what are the penetrating points through which ransomware can take over our system devices. Like any other malware these can infect system devices through usb drives, malicious web pages, exploit kits, malvertising, brute forcing passwords and perhaps the most common malicious emails. They may all sound like just your regular infection end points for any virus or malware, and that is because they are so. Similarly, the same precautions that we take for other threats should be taken for ransomware.

Detect / Protect – System protection systems must be up to date and sophisticated enough to detect any phishing attempt. It’s more than just about scanning for viruses and malware, but going even deeper into file systems especially where there important data files. Additionally, big corporations should not look for the cheapest alternative, instead look at an overall system security software that blocks all forms of malicious attacks that has been tested rigorously by independent specialized companies.
Prevent / Educate – Even the most sophisticated defense systems or firewalls cannot help once there is a weak chain in the link. Most of the times these are the end users. One of the most common type of form of infection is through malicious emails. These are distributed using botnets, networks of infected computers which range from hundreds or thousands. The idea is that they use lots of social engineering behind the concept of attacks. Typically an uninformed users in never aware of what may happen if they click on links that contain these malicious codes in the backgrounds.

According to Intermedia (2016), in one of their recent studies 94% of those who were in the studies could not tell the difference between a real email and a phishing email. In fact, many of them were not aware of the term “phishing” or “ransomware”. When they were sent a fake email that said it was sent by UPS, 62% of the people in the studies trusted it enough to click on the links that were placed in the falsified emails.

In general, all staff should be educated especially those who work in places that have high data integrity value and are not familiar with computer science. A strong computer security system is nothing if an internal user takes the bait.
Respond / Preparation – While we may have strong enforcement security measure in place, and educated users we must remember that attackers must only succeed once. Once they are through, there must be a contingency plan in order to know what are the next steps to be taken. As computer security experts we must plan for the future, otherwise a scenario such as that of the Hollywood hospital may occur. There’s a strong need for important data backups and isolating the infection.

These are sets of processes that should be implemented by those in charge of security. Isolating the infected end point is crucial, because it helps understand the number of host machines and data that has been tampered with. Finally, the plan always involves locating the penetration point, otherwise future attack attempts may be successful and a reoccurrence of the problem is not wishful.

Conclusion

Ransomware is a truly mean crime business model that is here to stay, and will only continue to adapt to the new technologies that are coming out every year. These will include devices such as those entering new markets such as virtual reality, game consoles, smart watches, and even smart TV’s of which the latter has been proven to be able to be infected by ransomware this year (Symantec, 2016). There will be new ransomware families with newer and stronger capabilities that will fully test the toughness of security experts and their systems.

Good security systems need to be in place, especially in organizations or even users who have high valued data as a means to produce an output. Even when they are in place people need to follow good practices for security management to mitigate the risks of these types of attacks. Reducing risk exposure as much as possible by educating users is a key aspect that must never be overlooked, along with patching up system software and keeping the security systems up to date. The latter need to always be up to date because they are vulnerable to remote exploitation through which these attacks can enter. Additionally, installing and keeping software from verified and trusted sources is also important. Credentials must also not be overlooked, especially for remote access. There’s the need for good practices such as two factor authentication and login. Morever, we must not believe that we are invincible when using systems such as those of Linux, MAC, and other lesser known operating systems. There are already nasty ransomware that run on these systems and they are bound to get better. When all countermeasures fail, a good back up plan is an essential in getting things back running once more.

References

Abrams, L. (2016). Ransom32 is the First Ransomware Written in JavaScript. Retrieved fromhttp://www.bleepingcomputer.com/news/security/ransom32-is-the-first-ransomware-written-in-javascript/

Brunau, C. (2016). Are You Familiar With these Type of Common Ransomware? Retrieved fromhttp://www.datto.com/blog/are-you-familiar-with-these-common-types-of-ransomware

Intermedia. (2016). Ransomware. A New Threat to Business Uptime. Retrieved fromhttps://www.intermedia.net/report/ransomware

Mogg, T. (2016). Hollywood Hospital Pays $17,000 to Ransomware Hackers. Retrieved fromhttp://www.digitaltrends.com/computing/hollywood-hospital-ransomware-attack/

Olenick, D. (2016). Microsoft Office 365 Hit with Massive Cerber Ransomware Attack. Retrieved fromhttp://www.scmagazine.com/microsoft-office-365-hit-with-massive-cerber-ransomware-attack-report/article/505845/

Palo Alto Networks.(2016). Unit 42 Report – Ransomware: Unlocking the Lucartive Criminal Business Model. Retrieved from https://www.paloaltonetworks.com/resources/research/ransomware-report

Stanfield, N. (2016). What are the effects of Ransomware? Retrieved fromhttp://www.stanfieldit.com/blog/what-are-the-effects-of-ransomware/

Sullivan, M. (n.d). 8 Types of Cyber Attacks your Business Needs to Avoid. Retrieved fromhttp://quickbooks.intuit.com/r/technology-and-security/8-types-of-cyber-attacks-your-business-needs-to-avoid/

Symantec. (2016). An ISTR Special Report Ransomware and Businesses. Retrieved fromhttp://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ISTR2016_Ransomware_and_Businesses.pdf

Trend Micro. (n.d). Ransomware. Retrieved from http://www.trendmicro.com/vinfo/us/security/definition/ransomware

computer security cryptolocker cybersecurity Information Technology ransomware

Article by ajMatus

Related Articles

  • alberto-matus-digital-piracy
    An Overview of Digital Piracy
  • belize cybersecurity strategy
    Belize National Cybersecurity Strategy 2020-2023

Leave your comment Cancel Reply

(will not be shared)

WELCOME

Hello, and welcome! I'm Alberto - a Cyber Security & Digital Forensics professional specializing in Digital forensics, Incident Response & Vulnerability Assessment. I hold a Master's degree in Cybersecurity with a concentration in Digital Forensics from the University of South Florida and a Bachelor degree in Information Technology from the University of Belize. Through this blog I hope to share tips, information about cybersecurity, cybercrime, digital forensics, open source technologies, business, and a bit of my amazing country. For those interested in any of my services please feel free to contact me using any of the associated contact details on this blog.

SEARCH

ARCHIVE

  • October 2022 (1)
  • July 2021 (2)
  • November 2020 (2)
  • October 2020 (1)
  • September 2020 (2)
  • August 2020 (2)
  • July 2020 (6)
  • June 2020 (6)
  • April 2020 (5)
  • February 2020 (1)
  • November 2019 (2)
  • October 2019 (1)
  • September 2019 (1)
  • June 2019 (1)
  • May 2019 (1)
  • November 2018 (6)
  • September 2018 (3)
  • August 2018 (4)
  • February 2018 (1)
  • January 2018 (3)
  • December 2017 (1)
  • October 2017 (5)
  • September 2017 (1)
  • December 2016 (2)
  • November 2016 (4)
  • October 2016 (1)
  • September 2016 (2)
  • August 2016 (5)
  • July 2016 (2)
  • June 2016 (2)

CALENDAR

March 2023
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031  
« Oct    

RECENT POSTS

  • Capture
    WordPress Empty template: Index Friday, 7, Oct
  • Belize – Benque Viejo to San Ignacio Town Drive Tuesday, 6, Jul
  • alberto-matus-digital-piracy
    An Overview of Digital Piracy Thursday, 1, Jul

REMOTE WORK

Remote work is my preferred way or working as I have a home office set up where all the magic happens. This method allows me to work with businesses, organizations, and all brands across the globe. I can manage projects via my own management applications or your own internal project management app. Any calls and meetings can be done through whatever tools fits your business, and I’m flexible to work on your time zone.

ON-SITE

Not every job assignment can be done via remote working methods, and so if it requires me to be on-site for the duration of the work then this can be done based on agreements or contractual work. I prefer doing these types of consultancies or hands-on types of work on the weekends but I am flexible enough depending on the terms. I am also open to traveling outside of Belize. All further afield work requires accommodation and travel expenses.

RETAINER

Sometimes clients are looking for long term partners that share a closer connection to their visions and goals. As such I am open to retainers. A retainer hires me for a certain amount of hours per month at a discounted rate. These discounted rates are usually between 10%-20% off depending on the contractual agreements.

Alberto - open source | technology | belize -Matus

Copyright ©2020. All Rights Reserved

en_USEnglish
en_USEnglish