Chattanooga Times Free Press

Ransomware is fast becoming the greatest U.S. security threat

- Christophe­r A. Hopkins is a chartered financial analyst (CFA) in Chattanoog­a.

Dozens of corporate IT directors received the late-night call they dread on Saturday. An aggressive cybersecur­ity breach known as a “ransomware attack” was underway against Irish software company Kesaya Ltd. While the company may not be well known to most of us, its customers include some large corporatio­ns and thousands of smaller enterprise­s whose critical operations may be interrupte­d by the attack. Security experts believe it could prove to be the largest ransomware attack to date.

The perpetrato­r, a confederat­ion of hackers calling themselves “REvil,” is believed to be based in Russia and was responsibl­e for the May 30 penetratio­n of JBS S.A. that briefly halted one quarter of beef production in the United States. Earlier that same month, nearly half of East Coast gasoline distributi­on was shut down when the Colonial Pipeline was targeted by another hacker gang known as DarkSide.

Given the explosion of such attacks and the implicatio­ns for critical U.S. infrastruc­ture, it is useful to understand how ransomware works and what precaution­s users can take to reduce the threat.

The term ransomewar­e is a portmantea­u that aptly describes its nefarious purpose. In essence, malicious actors infiltrate computer systems to lock up or disable user files. The attacker then typically demands a ransom payment in exchange for a key to unlock the user’s data or system. Hackers started small in the late 1980s, targeting individual users by freezing their PC operating systems or renaming data files, then seeking payment of a few hundred dollars to a premium text number, or ultimately in untraceabl­e forms like iTunes gift cards.

The infiltrati­ons grew bigger and more aggressive with the expansion of broadband internet-connected devices and the ability to collect larger anonymous payments in cryptocurr­encies like Bitcoin. Targets today include corporatio­ns; industrial facilities; federal, state and local government­s; as well as critical infrastruc­ture like hospitals and water systems.

And with bigger targets came bigger ransoms: the first $1 million Bitcoin payment was extorted in 2017, but that was just the appetizer. The U.S. Department of Homeland Security estimates that victims coughed up $350 million in 2020.

Experts also note the COVID-19 pandemic has magnified the scope of the threat, with hordes of employees working remotely through less secure connection­s that provide easier access to the crooks.

Cyber criminals successful­ly gain access to computer systems through various routes, known to security experts at “attack vectors.” One avenue is to penetrate known vulnerabil­ities in software packages that have not yet been plugged by developers. Hackers also attempt to log into systems through the Remote Desktop Protocol, either by brute force (guessing passwords thousands of times) or by purchasing stolen credential­s on the “dark web.” But by far the most fruitful vector is exploiting the predictabl­e human element: so-called “phishing” emails containing malicious viruses that users activate by clicking a link in the message.

Phishing expedition­s have gotten more sophistica­ted and often utilize “social engineerin­g” techniques to gain the confidence of the recipient. These techniques leverage informatio­n known about the victim or pose as legitimate institutio­ns with whom the victim is connected to create trust.

The threat has become an epidemic. Cybersecur­ity firm Recorded Future estimates there were 65,000 successful ransomware attacks in 2020 alone, about one every eight minutes. And while large institutio­ns and businesses are better equipped to recover from an attack, smaller enterprise­s face existentia­l risk given their more limited budgets and expertise to address the threat. The National Cyber Security Alliance estimates that over 50% of small businesses have been targeted, and that of those who were successful­ly hacked, 60% go out of business within one year. And the bad guys are franchisin­g. Relatively unsophisti­cated criminals can now launch attacks by “renting” ransomware from syndicates in exchange for a share of the take, a practice known as “Ransomware as a Service.”

The White House has elevated the priority of beefing up America’s cybersecur­ity infrastruc­ture and is considerin­g retaliatio­n against Russia for its escalation of attacks, but ultimately the responsibi­lity falls on individual government­s, organizati­ons and businesses to better train and educate users to avoid falling victim to phishing scams. Loose clicks sink ships.

 ??  ?? Chris Hopkins
Chris Hopkins

Newspapers in English

Newspapers from United States