British Companies Buy Bitcoins As Ransom Money

According to a cyber-security survey, 33% of UK companies are buying Bitcoin in anticipation of ransomware attacks. This comes after a Canadian university recently paid 20,000 Canadian dollars in Bitcoin for the encryption keys to their data.

Canadian university ransomware attack

More than 100 of the computers at the University of Calgary had been infected with the ransomware, causing email and other files to become encrypted. After their IT department spent countless hours trying to find a solution to the attack, it was resolved that they would pay the ransom money of CAD $20,000 (USD $15,780) in Bitcoin to the attackers.

Linda Dalgetty, the university’s vice President, said: “The university is now in the process of assessing and evaluating the decryption keys. The actual process of decryption is time-consuming and must be performed with care. It is important to note that decryption keys do not automatically restore all systems or guarantee the recovery of all data.”

The university also reported that there was no indication that “any personal or other university data was released to the public”. However, local police were still informed, and are investigating.

Recent spate of ransomware payouts

The attack and subsequent payout by the University of Calgary comes after the Hollywood Presbyterian Medical Center was attacked in February, and paid USD $17,000 to restore system access, while the Melrose Police Department in Massachusetts paid USD $450 in the same month.

Speaking to the BBC, Dr Steven Murdoch from University College London, said of paying the ransom money: “It’s very tempting for organisations to pay out the ransom because that might be the only way they can get their data back, but that makes it worse for everyone else because it encourages more people to set up schemes like the one used in the Calgary case. It would be better if nobody ever paid, although that’s unrealistic to expect.”
He added: “What’s making matters worse is a new trend. The hackers are threatening to publicly publish information they found on your computers if you refuse to pay, which acts as a double incentive to comply.”

Also speaking to the BBC, Raj Samani, European technology head for Intel Security, said of the ransomware ‘epidemic’, “Ransomware and crypto malware are rising at an alarming rate and show no signs of stopping.” The BBC also reported that “other researchers reported seeing a 3,500% increase in the criminal use of net infrastructure that helps run ransomware campaigns.”

UK firms preparing ransom money

A recent cyber-security survey by remote access developer Citrix found that of the 250 companies of various sizes that were surveyed, 33% of the IT and cyber-security specialists representing them said they were buying Bitcoin in anticipation of ransomware attacks.

The survey found that; 36% of smaller businesses (250-500 employees), 57% of medium-size businesses (501-1000 employees), and 18% of larger firms (>2000 employees had cryptocurrency in storage, with larger firms saying they were willing to pay up to £50,000 (USD $71,675) in Bitcoin for encryption keys if the data contained important intellectual property or business-critical data.

Analysis by Finance Magnates verbalised what many in the cryptocurrency community are inevitably thinking:

“This poll’s results raise a few interesting questions such as: why not just open an account with an exchange, which would not cost anything until (or if) the money is really needed; why not invest the funds in improving security or just get an insurance plan against hackers instead of paying ransoms and encouraging future attacks; and, isn’t holding bitcoin just giving hackers another target to aim for if they have already gained access to your systems?”

New UK cryptocurrency laws

Perhaps the answer to the ransomware problem, at least in the eyes of the British lawmakers, is increased regulation. In a presentation to Members of the British Parliament, the Crown Prosecution Service (CPS), said virtual currencies are “increasingly a feature of serious and organised crime.”

The CPS is petitioning MPs to pass new laws to help them stop criminals and terrorists using Bitcoin, arguing that “these currencies allow criminals to operate and launder money without any legitimate oversight of their activity. A power for law enforcement to seize, hold and sell virtual currency is required if we are to keep abreast of changes in the manner sophisticated criminals operate.”

Keith Vaz, the chairman of the Commons Home Affairs Committee said of the proposal: “I welcome the recommendation by the CPS that new laws are needed to seize virtual currencies, which are increasingly used by organised criminals, as well as terrorist groups. Virtual currency transactions are far from transparent, and clearly better oversight is needed to prevent anonymous and sophisticated money laundering operations.”

Coin Telegraph

 

« Beware: Top Cyber Scams To Avoid This Summer
US National Cybersecurity Plan Costs $19b »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Puppet

Puppet

Puppet is a leader in IT automation. Our software helps DevOps securely automate configuration and management of machines and the software running on them.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

8MAN

8MAN

8MAN is a leading Access Rights Management (ARM) solution in Microsoft and virtual server environments.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

National Association of Software and Services Companies (NASSCOM) - India

National Association of Software and Services Companies (NASSCOM) - India

NASSCOM is a trade association of Indian Information Technology and Business Process Outsourcing industry. Areas of activity include cyber security.

Progress Flowmon

Progress Flowmon

Progress Flowmon (formerly Flowmon Networks) provide high performance network monitoring technology and behavior analytics to enhance network performance and deal with cyber threats.

Security Brokers

Security Brokers

Security Brokers focus services and solutions with a focus on strategic ICT Security and Cyber Defense issues.

Consult Hyperion

Consult Hyperion

Consult Hyperion is an independent strategic and technical consultancy specialising in digital identity and secure electronic transactions.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

File Centre

File Centre

File Centre is a leading specialist when it comes to data backup, we offer our clients a premium backup retrieval and delivery solution.

Marvell Technology Group

Marvell Technology Group

Marvell is a semiconductor company providing solutions for storage, processing, networking, security and connectivity.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.