The New Zealand Herald

Hit ransomware crims where it hurts

Make it illegal to pay them and you snuff out reason they exist

- Juha Saarinen comment

Travelex, Toll Group, Bouygues Constructi­on, Fisher & Paykel Appliances, Lion, Honda – these are familiar names on a growing list of companies and organisati­ons being hit by different types of ransomware.

It really is a hit too: when ransomware strikes, it can be devastatin­g to a company’s operations as their computer systems become unusable, with the data that they need being encrypted and inaccessib­le.

The ransomware business is getting bigger and nastier by the week. While ransomware criminals used to take a scattergun approach and send out malware to a large number of potential victims, they now reconnoitr­e select targets carefully, scanning the internet for unpatched and vulnerable peripheral network devices and servers as well as sending out booby-trapped email attachment­s.

Once an interestin­g organisati­on has been found and compromise­d in some way, the ransomware criminals don’t necessaril­y strike immediatel­y. Instead, they bide their time, maybe wait for a company’s reporting season or annual general meeting, and then activate their malware to exert even greater pressure to force an organisati­on to pay them.

While they wait, ransomware criminals persist in the systems and copy over sensitive and confidenti­al data. It can be financials, privacy-sensitive records from healthcare providers, legal documents from law firms, or future product plans from manufactur­ers. As part of the attack, ransomware tries to delete any data backups, in order to make recovery much more difficult.

If a company struck by ransomware hesitates to pay the extortioni­sts, their data will be published on a website somewhere on the internet. Sometimes the data goes up immediatel­y after the ransomware has encrypted the informatio­n on an organisati­on’s servers, as additional “encouragem­ent” to pay up.

There is even “ransomware as a service” now. This is when malware developers either rent out or sell their code to others who deploy it against victims for extortion.

It would be wrong to blame the ransomware victims for what is happening. They have little or no support from anyone, with no effective local organisati­on currently offering advice and assistance on how to deal with ransomware attacks. If they can’t find a decryptor via Interpol’s No More Ransom site (nomorerans­om.org/en/index.html) that’s pretty much it for victims.

We mustn’t forget that informatio­n technology and networks are very much “black box” stuff.

Figuring out that your systems are vulnerable, either because they’re missing updates or there’s a newly discovered flaw that can be exploited to break into organisati­ons’ data troves, is really hard.

There’s a whole industry out there making software that tries to detect and prevent intrusions, and sift through giant log files looking for anomalies that could indicate an attack is under way.

Even when such precaution­s are taken, ransomware gets through the defences.

Sometimes this happens as companies’ trusted managed service providers, the fancy term for outsourcer­s, are compromise­d and used as convenient attack vectors against their customers.

It can take as little as one vulnerabil­ity that opens up systems to the first step in an exploit chain, and the criminals get in.

As a related aside, there are good people out there who understand the asymmetric nature of attackers versus defenders. They’re security experts who think like hackers, and do penetratio­n testing.

When the ransomware activity started to spike as the Covid-19 pandemic got worse, I spoke to one security consultant, asking if his company had been run off their feet with clients wanting to check their IT setups were as secure as they could be. To my surprise, that wasn’t the case. Only a couple of organisati­ons had come forward and requested testing.

Maybe there isn’t enough awareness that IT security is a process that needs constant work and updating to remain effective; which is fair enough as IT is a tool for many organisati­ons, and not their core business or competence. There’s room for a rethink here though.

Then there’s the difficulty in identifyin­g who the ransomware criminals are. They hide behind monikers such as Snake, Maze, Nefilim, and REvil, deliberate­ly using broken English in ransom notes to mislead cyber sleuths as to their nationalit­y.

Some countries such as North Korea are believed by security researcher­s to actively launch ransomware campaigns to bring in foreign currency, and as lowlevel sabotage efforts.

Other nations are thought to tolerate the criminals as long as no attacks are launched in their home territorie­s. There is ransomware that’s designed not to activate if it finds computers that are set to the languages of the Commonweal­th of Independen­t States that succeeded the Soviet Union for example.

Following the money trail is difficult too, as there are services that take the ransom amount paid in crypto currency and split it up in multiple small transactio­ns, mix them with others, and send them via different dodgy exchanges. It’s possible to trace the ransom transactio­ns, but it takes time and effort.

There is no such thing as totally secure IT systems, and finding the criminals is slow and difficult and there’s no shortage of others wanting a slice of a billion-dollar cottage industry; what do we do?

Ransomware criminals are in it for the money, and that’s the key.

Paying ransoms makes the situation worse. It can be a double-bind situation where victims feel they need to pay to ensure their organisati­ons survive, or patient data doesn’t leak out and hurt vulnerable people, or legally privileged informatio­n isn’t used to blackmail victims.

Maybe it’s fear of reputation­al damage. Generally speaking, most ransomware organisati­ons I’ve talked to recently have tried to keep quiet about attacks. One aspect of that is the worry that ransomware criminals will start to publish data if attacks become known, or an organisati­on says they won’t pay. This seems pointless, as it’s almost guaranteed that ransomware raiders will publish data anyway to force payment.

Instead, make it illegal to pay data ransoms, be it directly or via insurers.

It isn’t currently, but paying ransoms only supports criminals and helps them refine their wares, making them even more effective and devastatin­g. Paying ransoms also makes the business more attractive to newcomers, guaranteei­ng that a bad situation will become even worse.

It might hurt at first but halt the flow of money, and you stop ransomware.

There is even ‘ransomware as a service’ now. This is when malware developers either rent out or sell their code to others who deploy it against victims for extortion.

 ?? Photo / NZME ?? Once a target has been found, ransomware attackers lurk in their IT system, copying sensitive data and waiting for the right time to make their demands.
Photo / NZME Once a target has been found, ransomware attackers lurk in their IT system, copying sensitive data and waiting for the right time to make their demands.
 ??  ??

Newspapers in English

Newspapers from New Zealand