Manawatu Standard

Embarrasse­d firms pay big ransoms, keep quiet

- JULIE ILES

Companies are usually too embarrasse­d to admit to falling victim to cyber attacks, says a cyber security expert.

The recent Wannacry ransomware preyed on known vulnerabil­ities in systems that companies tend to leave ‘‘unpatched and unprepared’’, said Redshield chief executive and founder Andy Prow.

‘‘There are a lot of organisati­ons that would rather it not be public,’’ he said.

Prow said he was privy to ‘‘closed door discussion­s’’ following six massive ransomware attacks on companies in the United States, where seven-figure transactio­ns were kept under the covers.

‘‘Some of those have been highprofil­e organisati­ons and so actually the payment itself is fully undisclose­d, because in many ways the fact there was a compromise is quite embarrassi­ng.’’

Malware paired with cryptocurr­ency transactio­ns was one of the fastest-growing issues Red Alert was seeing, Prow said.

‘‘Personal data and business data has become invaluable and cyber criminals are taking advantage of that.’’

Prow expected ransomware paired with data encryption, data destructio­n, and business interrupti­on would become more common.

‘‘This is proving to be an effective commercial model.’’

But New Zealand companies are often smaller, easier to patch and less targeted, Prow said.

The Wannacry ransomware infection largely missed New Zealand computers.

The sole New Zealand business reported to be affected by the Wannacry cyber attack so far has been Christchur­ch’s Lyttelton Port. The port scheduled an urgent systems outage from 11pm yesterday until 7am this morning.

Cert NZ said it had not received any fresh reports of Wannacry impacting New Zealanders since Monday, when it received ‘‘a small number’’ of attack reports which it was still seeking to confirm, a spokeswoma­n for the government cyber-crime agency said.

The Financial Times reported that Microsoft was targeted with a repurposed cyber-spying tool called Eternalblu­e, which was stolen from the US National Security Agency and leaked online last August by an entity calling itself the ‘‘Shadow Brokers’’.

Eternalblu­e exploited a security loophole in Windows operating systems that allowed malicious code to spread through file-sharing structures such as dropboxes and shared drives.

In a statement, Microsoft president Brad Smith said the attack should be treated as a ‘‘wake-up call’’ for government­s, which he accused of ‘‘hoarding these vulnerabil­ities’’.

‘‘They need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world,’’ Smith said.

The ransomware’s ‘‘kill switch’’ was activated thanks to a 22-year-old British cyber analyst, who purchased an obscure web address the ransomware was querying for $11 and activated it.

There have been no reported instances where paying the Wannacry ransom has resulted in decryption.

 ?? PHOTO: REUTERS ?? There have been no reported instances where paying the ransom has resulted in decryption.
PHOTO: REUTERS There have been no reported instances where paying the ransom has resulted in decryption.

Newspapers in English

Newspapers from New Zealand