Cyber Extortion: A Growth Industry

011214_1337_CyberExtort1.jpg

The prevailing wisdom in law enforcement has been that it is a bad idea to negotiate with extortionists. Cave to their demands and all you’re doing is encouraging more extortion. And you don’t even have a guarantee that paying a ransom will produce the return of your loved one unharmed, or your stolen assets.

Better to refuse the demands, find the criminals and punish them in a way that will discourage them and others from doing the same thing. But, in the digital world, where criminals encrypt data and then demand a ransom to provide the key, that prevailing wisdom is getting a forcible adjustment.


The first reality is that, much of the time, cyber extortionists are far beyond the reach of domestic law enforcement. Second, most of them actually make good on unlocking the data once the ransom has been paid, because they want future victims to pay up as well.

In some cases, it is law enforcement itself that is paying the ransoms. The Boston Globe reported recently that the police department in Tewksbury, a Boston suburb, had paid a $500 ransom to criminals who had encrypted data including arrest and incident records.

In short, this is a growth industry. Most thieves have learned that if they keep the ransom relatively low – a few hundred dollars – and get a reputation for providing the encryption key once the ransom has been paid, those few hundred dollars per victim can add up to thousands per month.

Val Saengphaibul, security response manager at Symantec, said his firm knows of one cyber gang that makes, “at least $35,000 a month. Other cyber-gangs have taken note and there are quite a few of them running this scam,” he said, noting that, “payment is not easily traced or stopped, and targeting specific data files that are valuable to people and organizations increases the likelihood of payment.”
 

Indeed, a recent survey by ThreatTrack Security found that 30% of the security professionals who responded said they would negotiate with the extortionists. And that percentage rose to 55% among organizations that have already fallen victim to cyber-extortionists.

Some of that was conditional. When asked if organizations should set aside funds for paying ransoms to recover their data, 45% gave a conditional “yes,” but nearly half of them said it would “depend on the data.” The most important, in their view, were employee Social Security numbers, addresses and salaries.”
Stuart Itkin, ThreatTrack’s senior vice president, said there is obviously no guarantee that criminals will unlock the encrypted data, but that it is in their, “best interest to keep their word so victims succumb and they continue making money by infecting more people.”
He said ransomware developers have even, “created safeguards to ensure their malware doesn’t infect the same victims again after they’ve paid a ransom.”
Jody Westby, CEO of Global Cyber Risk, also said in her experience, cyber extortionists have kept their side of the deal. She said for most of her clients, it comes down to a business decision.
“I have seen IT guys say, ‘No way, we aren't negotiating or paying a dime,’” she said. “But then the CFO or another C-suite executive gets involved, evaluates the amount of money requested, and says it is a no-brainer: They are going to pay and keep the business running. It would cost more to have the system down.”

Of course, not all extortionists are so “honorable”. According to Saengphaibul, “if you look hard enough, you’ll find numerous victims experiences showing hackers not upholding their end of the deal by not unlocking computers after ransom is paid.”
Saengphaibul said Symantec sticks with the more traditional law enforcement philosophy – don’t pay up.
“Paying the ransom just further promotes this illegal activity,” he said. “It’s unlikely that victims will get their files back anyway, so don’t put money in the criminals’ pockets.  If we deny the criminals profit, then there is no point in running the scam. They move on.”
He said if extortion targets have regularly backed up their files, they can’t be victimized in the first place. “When there is no demand on the underground economy for ransomware attack services, hackers will ultimately be out of business,” he said.
But, particularly for businesses, it is not always as simple as having backup files.
“Everyone should have backups,” Westby said. “But that is not the issue. The issue is having the data disclosed. They pay to get it back so it won't be disclosed.”
She said if a company refuses to pay the demanded ransom, extortionists can start making it public. “They can start disclosing data in pieces, or send some of the most damaging to the press, they can sell the data on the black market or to a competitor company,” she said.
“The damage is to reputation, loss of market share, loss of customer and pricing data or other strategic business data that could have a real impact on the bottom line.”
Itkin agrees. “Data breach headlines, lawsuits, eroded customer trust and other collateral damage a breach can cause gives (extortionists) tremendous leverage,” he said.
“All you have to do is look at the fallout from the Sony breach. First, the extortionists succeeded in manipulating Sony’s release of a major motion picture, which had financial consequences for not just Sony, but the theaters that planned to screen it, among others. Second, their data was perfect for wide-spread media appeal – dripping with Hollywood gossip.”
“I have seen IT guys say, ‘No way, we aren't negotiating or paying a dime. But then the CFO or another C-suite executive gets involved, evaluates the amount of money requested, and says it is a no-brainer: They are going to pay and keep the business running.”

That means, while data backups ought to be regular and automatic, they are not enough. Rigorous, end-to-end encryption ought to be mandatory as well, since it can make most stolen data useless to extortionists.
With stolen encrypted data, “criminals don't even know what they have to ask ransom for it,” Westby said, adding that, “cyber extortion insurance also is good, because we are in a new era of cybercrime.”
But beyond backups and encryption, experts including Saengphaibul say that, “security is multilayered and requires an encompassing approach – endpoint security, employee training, system updates, etc.”
Security, he said, should include not just traditional anti-virus, but also, “download protection, browser protection, heuristic technologies, firewall and a community sourced file reputation scoring system.”
And when it comes to negotiation, Itkin said security pros should, “always be aware that cybercriminals’ No. 1 priority is making money, not keeping their word.”
CIO: http://bit.ly/1IDU2Zq

 

« ECHELON Has Been Watching You All Your Life
90% of Android Devices Are DoS Vulnerable »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

CyberTrap

CyberTrap

CyberTrap is an advanced highly-interactive deception technology allowing real-time analysis and control of security breaches.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

sayTEC

sayTEC

sayTEC's mission is to develop and deliver next-generation products and services in encrypted data and voice transmission.

infySEC

infySEC

InfySEC is an information security services organization offering Security Technology services, Security Consulting, Security Training, Research & Development.

Nextcloud

Nextcloud

Nextcloud offers offers solutions to the combined need of security and ubiquitous access to data and collaboration technology.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Socure

Socure

Socure’s identity verification increases auto approval rates, reduces false positives and captures more fraud. In real time.

Nucleon Security

Nucleon Security

Nucleon Endpoint Detection and Response EDR is the most effective way to protect the value created by your organization against any threat.

Sencode Cyber Security

Sencode Cyber Security

Sencode provides a range of IT security solutions and services, including penetration testing and cyber awareness training to help mitigate the growing risks to your corporate infrastructure.

Technivorus Technology

Technivorus Technology

Technivorus is a deep-tech firm delivering customized Cybersecurity, Digital Marketing, Web & App Development, and multifarious IT services for businesses across the globe.

BugProve

BugProve

BugProve offers a firmware analysis tool that speeds up security testing processes and supports compliance needs by automating repetitive tasks and detecting 0-day vulnerabilities.

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.