How ransomware became a disruptive and lucrative form of cybercrime

Author : jihanpermatah56
Publish Date : 2021-05-29 20:26:37


How ransomware became a disruptive and lucrative form of cybercrime

In the past five years, ransomware attacks have evolved from rare misfortunes into common and disruptive threats. Hijacking the IT systems of organisations and forcing them to pay a ransom in order to reclaim them, cybercriminals are freely extorting millions of pounds from companies – and they're enjoying a remarkably low risk of arrest as they do it.

At the moment, there is no coordinated response to ransomware attacks, despite their ever-increasing prevalence and severity. Instead, states' intelligence services respond to cybercriminals on an ad-hoc basis, while cyber-insurance firms recommend their clients simply pay off the criminal gangs that extort them.

Neither of these strategies is sustainable. Instead, organisations need to redouble their cybersecurity efforts to stymie the flow of cash from blackmailed businesses to cybercriminal gangs. Failure to act means that cybercriminals will continue investing their growing loot in ransomware technologies, keeping them one step ahead of our protective capabilities.

https://stmarklions.instructure.com/eportfolios/454/Home/Ver_Aquellos_que_desean_mi_muerte_2021_Pelcula_Completa_en_Espaol_Latino
https://stmarklions.instructure.com/eportfolios/454/Home/Godzilla_vs_Kong_2021__Pelicula_Completa_Ver_Online
https://stmarklions.instructure.com/eportfolios/454/Home/El_virtuoso_2021_Pelicula_Completa_en_Espaol_Latino_gratis
https://stmarklions.instructure.com/eportfolios/454/Home/REPELIS__Nadie_2021_Ver_Pelcula_CompletaGRATISen_Espanol_Latino
https://stmarklions.instructure.com/eportfolios/454/Home/REPELIS_Vanquish_2021_Pelcula_Completa__ONLINE_GRATIS_EN_ESPANOL_Y_LATINO_HD

From RTÉ Radio 1's Morning Ireland, Fergal Malone, Master of the Rotunda Hospital, on the ranswomware attack which is affecting all of the hospital's electronic systems and records

Daylight robbery
Ransomware is a lucrative form of cybercrime. It works by encrypting the data of the organisations that cybercriminals hack. The cybercriminals then offer organisations a choice: pay a ransom to receive a decryption code that will return your IT systems to you, or lose those systems forever. The latter choice means that firms would have to rebuild their IT systems (and sometimes databases) from scratch.

Unsurprisingly, many companies choose to quietly pay the ransom, opting never to report the breach to the authorities. This means successful prosecutions of ransomware gangs are exceedingly rare.

In 2019, the successful prosecution of a lone cybercriminal in Nigeria was such a novelty that the US Department of Justice issued a celebratory press release. Meanwhile, in February 2021, French and Ukrainian prosecutors managed to arrest some affiliates Egregor, a gang that rents powerful ransomware out for other cybercriminals to use. It appears that those arrested merely rented the ransomware, rather than creating or distributing it. Cybersecurity experts have little faith in the criminal justice system to address ransomware crimes.

From RTÉ Radio 1's Morning Ireland, HSE CEO Paul Reid on what they are doing to contain a very sophisticated human-operated ransomware attack on its computer systems

The frequency of those crimes is increasing rapidly. An EU report published in 2020 found that ransomware attacks increased by 365% in 2019 compared to the previous year, resulting in €10.1 billion (£8.7 billion) of losses in payouts alone. Since then, the situation is likely to have become much worse.

Even hospitals have suffered attacks. Given the potential impact of a sustained IT shutdown on human lives, healthcare databases are in fact actively targeted by ransomware gangs, who know they'll pay their ransoms quickly and reliably. In 2017, the NHS fell foul of such an attack, forcing staff to cancel thousands of hospital appointments, relocate vulnerable patients, and conduct their administrative duties with a pen and paper for several days.

Waging war?
With ransomware spiralling out of control, radical proposals are now on the table. Chris Krebs, the former head of the US Cybersecurity and Infrastructure Security Agency, recently advocated using the capabilities of US Cyber Command and the intelligence services against ransomware gangs.

The US government and Microsoft coordinated over such a attack in 2020, targeting the "Trickbot botnet" malware infrastructure – often used by Russian ransomware gangs – to prevent potential disruption of the US election. Australia is the only country to have publicly admitted to using offensive cyber capabilities to destroy foreign cybercriminals' infrastructure as part of a criminal investigation.

From RTÉ Radio 1's Morning Ireland, John Kennedy from Silicon Republic on the 2017 wave of ransomware attacks which has affected Russia and Ukraine

Sustained operations of this kind could have an effect on cybercriminals' ability to operate, especially if directed against the gangs' servers and the infrastructure they need to turn their bitcoin into cash. But unleashing offensive cyberwarfare tools against criminals also creates a worrying precedent.

Normalising the use of the armed forces or intelligence units against individuals residing in other countries is a slippery slope, especially if the idea is adopted by some of the less scrupulous regimes on this planet. Such offensive cyber operations could disrupt another state's carefully planned domestic intelligence operations. They could also negatively affect the innocent citizens of foreign states who unwittingly share web services with criminals.

Further, many cybercriminals in Russia and China enjoy de facto immunity from prosecution because they occasionally work for the intelligence services. Others are known to be state hackers moonlighting in cybercrime. Targeting these people might diminish the ransomware threat, but it might just as well provoke revenge from hackers with far more potent tools at their disposal than ordinary cybercriminals.

Paying up
So what is the alternative? Insurers, especially in the US, urge their clients to quickly and quietly pay the ransom to minimise the damage of disruption. Then insurers allow the company to claim back the ransom payment on their insurance, and raise their premiums for the following year. This payment is usually handled discreetly by a broker. In essence, the ransomware ecosystem functions like a protection racket, effectively supported by insurers who are set to pocket higher premiums as attacks continue.



Category : business

Should I Acquire A Citrix 1Y0-241 Certification In 2021?

Should I Acquire A Citrix 1Y0-241 Certification In 2021?

- Cyber security is a means to protect the automated and interconnected system from any unauthenticated access.


Tips For Passing SAP C_TS452_1909 Certification Exam [2021]

Tips For Passing SAP C_TS452_1909 Certification Exam [2021]

- A well-rounded training is going to be the vital to a beautifully rounded particular person which usually experienced potential


Why Do Candidates Fail In The Real Nutanix NCP-5.15 Certification Exam In?

Why Do Candidates Fail In The Real Nutanix NCP-5.15 Certification Exam In?

- Major and organizing a group for the job necessitates distinct recognition and expertise. Undertaking Management Proficient


Guide To Pass HP HPE6-A70 Certification Exam

Guide To Pass HP HPE6-A70 Certification Exam

- School scholarships have aided many folks to obtain their academic goals. While most possess the wildest ideas of frequent