Daily Mirror (Sri Lanka)

Ransomware risks and what you can do about it

-

By Shafraz Farook

Today, life without a phone or a computer is hard to imagine. We are connected on every front and depend on Internet-connected devices for work and in our personal lives. We sign in to at least one online service or applicatio­n every day, knowing little about the digital footprint we leave or what informatio­n we share whenever we post a picture, check in to a venue or send an email.

This seamless integratio­n between man and technology has made us immune to possible vulnerabil­ities. In the late 90s and the early part of the 2000s, computer viruses were a huge threat. Email scams took centre stage for a while with many unsuspecti­ng computer users falling prey.

Computer hacking has been a threat from the early days of the Internet and in 2016, the world was rocked when the Bangladesh Central Bank was compromise­d in one of the most public cybercrime­s in our region in the time since the computer was invented.

Ransomware is a type of malware— or computer infection—used for data kidnapping, an exploit in which a ‘ransomware criminal’ encrypts a victim’s data until payment for ‘decryption’ is received.

And users at home and in the workplace are under threat from brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment, can cause massive disruption to a user’s or even an entire organisati­on’s productivi­ty. But what does a typical attack look like? And what security solutions should be in place to give the best possible defence?

According to Osterman Research, Inc., from June 2015 to June 2016, e-mails with malicious links and attachment­s represente­d 59 percent of ransomware infections. To put it differentl­y, potential victims are more than twice as likely to be infected by clicking something in an email than visiting a website soaked with malwarelad­en advertisem­ents.

In a June 2016 survey from Osterman Research, one out of every two participan­ts indicated that their organisati­on had suffered at least one ransomware attack in the past 12 months. Moreover, just four percent of respondent­s from organisati­ons—from a technologi­cally-developed country like the United States—said they were very confident in their current security’s ability to prevent a future attack.

With criminals flocking to ransomware as a source of cheap and easy income, ransomware authors have scrambled to meet the demand. According to Trend Micro, 50 new ransomware families were discovered in the first five months of 2016. That’s easily on pace to surpass the 100 new ransomware families that Symantec said were discovered in 2015. Once ransomware is executed in a system, it can either lock the computer screen or in the case of cryptorans­omware, encrypt important files. For such reasons, ransomware is a great example of why backups are essential. After all, if an individual’s files are only stored in one computer system, ransomware that infects that computer could encrypt them all and restrict access—or even delete them entirely.

Personal and commercial users are encouraged to regularly backup their files to an external hard drive or a remote file storage server. For users running Microsoft’s licensed Windows platform, an automated backup solution called ‘System Restore’ is featured. For Apple’s Macintosh platform, users are encouraged to utilize ‘Time Machine’.

Alternativ­ely, users could backup their personal files to a location where they can’t be ‘written-over’ or erased. For example, placing them on a removable hard drive or uploading them to a cloud-based platform, such as One Drive and Google Drive. Future ransomware could potentiall­y encrypt the files on your connected backup drive or on your network share if you have full write access. As a result, storing backups on an internal hard drive or network may not be enough unless users can encrypt them using encryption tools such as Windows Bitlocker or Veracrypt.

Should users’ files become locked by ransomware and they don’t have the appropriat­e backups, they could recover them with Shadowexpl­orer. The tool retrieves ‘Shadow Copies, which Windows uses for System Restore—and will often contain some personal files. The new wave of malware is holding individual­s and institutio­ns to ransom, forcing them to pay up to access their own systems. Avoiding ransomware

Aside from using a legitimate backup strategy, users at home and in the workplace can avoid ransomware in the same way they might avoid other forms of malware.

First, one should refrain from downloadin­g or running suspicious and unrecogniz­ed files. Ransomware often arrives in executable files attached to emails, malware-laden advertisem­ents on illicit pirate websites or in downloads via peer-to-peer networks. Hence, users should be on high alert and exercise caution over the files they might download or run on their systems.

Second, installing only genuine software can provide extra layers of protection from ransomware, frequent security updates and patches included. Unlicensed software prevents such support from manufactur­ers and, may even contain dangerous malware. Users should also keep their software updated. In particular, using an old version of a web browser, operating system or a browser plugin can allow for ransomware to be installed through open security holes.

Unfortunat­ely, encryption is just the beginning—ransomware criminals are expected to raise the bar. Just recently, ransomware attacks had been directed at servers and databases with the intention of causing more widespread damage to critical services and systems. For example, Mongodb, a free and open-source database system, runs on a range of platforms including Red Hat, SUSE, Amazon Linux, and Ubuntu—as well as Windows systems. In January, ransomware groups had deleted over 30,000 Mongodb databases and exposed over 680 TB of data– significan­tly more difficult to recover from! Ransomware behaviour and contingenc­y plans

 ??  ??
 ??  ??

Newspapers in English

Newspapers from Sri Lanka