The Reporter (Lansdale, PA)

Global war on ransomware? Hurdles hinder the US response

- By Alan Suderman

Foreign keyboard criminals with scant fear of repercussi­ons have paralyzed U.S. schools and hospitals, leaked highly sensitive police files, triggered fuel shortages and, most recently, threatened global food supply chains.

The escalating havoc caused by ransomware gangs raises an obvious question: Why has the United States, believed to have the world’s greatest cyber capabiliti­es, looked so powerless to protect its citizens from these kind of criminals operating with near impunity out of Russia and allied countries?

The answer is that there are numerous technologi­cal, legal and diplomatic hurdles to going after ransomware gangs. Until recently, it just hasn’t been a high priority for the U.S. government.

That has changed as the problem has grown well beyond an economic nuisance. President Joe Biden intends to confront Russia’s leader, Vladimir Putin, about Moscow’s harboring of ransomware criminals when the two men meet in Europe later this month. The Biden administra­tion has also promised to boost defenses against attacks, improve efforts to prosecute those responsibl­e and build diplomatic alliances to pressure countries that harbor ransomware gangs.

Calls are growing for the administra­tion to direct U.S. intelligen­ce agencies and the military to attack ransomware gangs’ technical infrastruc­ture used for hacking, posting sensitive victim data on the dark web and storing digital currency payouts. Fighting ransomware requires the nonlethal equivalent of the “global war on terrorism” launched after the Sept. 11 attacks, said John Riggi, a former FBI agent and senior adviser for cybersecur­ity and risk for the America Hospital Associatio­n. Its members have been hard hit by ransomware gangs during the coronaviru­s pandemic.

“It should include a combinatio­n of diplomatic, financial, law enforcemen­t, intelligen­ce operations, of course, and military operations,” Riggi said.

A public-private task force including Microsoft and Amazon made similar suggestion­s in an 81-page report that called for intelligen­ce agencies and the Pentagon’s U.S. Cyber Command to work with other agencies to “prioritize ransomware disruption operations.”

“Take their infrastruc­ture away, go after their wallets, their ability to cash out,” said Philip Reiner, a lead author of the report. He worked at the National Security Council during the Obama presidency and is now CEO at The Institute for Security and Technology.

But the difficulti­es of taking down ransomware gangs and other cybercrimi­nals have long been clear. The FBI’s list of mostwanted cyber fugitives has grown at a rapid clip and now has more than 100 entries, many of whom are not exactly hiding. Evgeniy Bogachev, indicted nearly a decade ago for what prosecutor­s say was a wave of cyber bank thefts, lives in a Russian resort town and “is known to enjoy boating” on the Black Sea, according to the FBI’s wanted listing.

Ransomware gangs can move around, do not need much infrastruc­ture to operate and can shield their identities. They also operate in a decentrali­zed network. For instance, DarkSide, the group responsibl­e for the Colonial Pipeline attack that led to fuel shortages in the South, rents out its ransomware software to partners to carry out attacks.

Katie Nickels, director of intelligen­ce at the cybersecur­ity firm Red Canary, said identifyin­g and disrupting ransomware criminals takes time and serious effort.

“A lot of people misunderst­and that the government can’t just willy-nilly go out and press a button and say, well, nuke that computer,” she said. “Trying to attribute to a person in cyberspace is not an easy task, even for intelligen­ce communitie­s.”

Reiner said those limits do not mean the United States cannot still make progress against defeating ransomware, comparing it with America’s ability to degrade the terrorist group al-Qaida while not capturing its leader, Ayman al-Zawahiri, who took over after U.S. troops killed Osama bin Laden.

“We can fairly easily make the argument that al-Qaida no longer poses a threat to the homeland,” Reiner said. “So short of getting al-Zawahiri, you destroy his ability to actually operate. That’s what you can do to these (ransomware) guys.”

The White House has been vague about whether it plans to use offensive cyber measures against ransomware gangs. Press secretary Jen Psaki said Wednesday that “we’re not going to take options off the table,” but she did not elaborate. Her comments followed a ransomware attack by a Russian gang that caused outages at Brazil’s JBS SA, the second-largest producer of beef, pork and chicken in the United States.

Gen. Paul Nakasone, who leads U.S. Cyber Command and the National Security Agency, said at a recent symposium that he believes the U.S. will be “bringing the weight of our nation,” including the Defense Department, “to take down this (ransomware) infrastruc­ture outside the United States.”

Sen. Angus King, an independen­t from Maine who is a legislativ­e leader on cybersecur­ity issues, said the debate in Congress over how aggressive the U.S. needs to be against ransomware gangs, as well as state adversarie­s, will be “front and center of the next month or two.”

“To be honest, it’s complicate­d because you’re talking about using government agencies, government capabiliti­es to go after private citizens in another country,” he said.

The U.S. is widely believed to have the best offensive cyber capabiliti­es in the world, though details about such highly classified activities are scant. Documents leaked by former NSA contractor Edward Snowden show the U.S. conducted 231 offensive cyber operations in 2011. More than a decade ago a virus called Stuxnet attacked control units for centrifuge­s in an undergroun­d site in Iran, causing the sensitive devices to spin out of control and destroy themselves. The cyberattac­k was attributed to America and Israel.

U.S. policy called “persistent engagement” already authorizes cyberwarri­ors to engage hostile hackers in cyberspace and disrupt their operations with code. U.S. Cyber Command has launched offensive operations related to election security, including against Russian misinforma­tion officials during U.S. midterm elections in 2018.

After the Colonial Pipeline attack, Biden promised that his administra­tion was committed to bringing foreign cybercrimi­nals to justice. Yet even as he was speaking from the White House, a different Russianlin­ked ransomware gang was leaking thousands of highly sensitive internal files — including deeply personal background checks — belonging to the police department in the nation’s capital. Experts believe it’s the worst ransomware attack against a U.S.-based law enforcemen­t agency.

“We are not afraid of anyone,” the hackers wrote in a follow-up post.

Newspapers in English

Newspapers from United States