IBM X Force Dissect The Destructive Power Of Malware

Destructive malware that disables access to data or destroys system functions has been expanding across geographies and industries over the past few years. Organisations previously thought safe from this form of cyber aggression increasingly finds themselves affected, either directly or indirectly. 

IBM has produced a Report called Combating Destructive Malware, which explains the significant effects and the lessons learnt.

The cost of a destructive malware infection can be significant for an organisation. In fact, IBM X-Force Incident Response and Intelligence Services (IRIS) estimates that victimised organisations on average experience a total cost of over $200 million and have more than 12,000 devices destroyed in an attack. Recovery from destructive malware can also require hundreds of hours to remediate and rebuild environments that have been destroyed. 

The NotPetya malware that hit organisations across the globe is a stark example of the costly damage that destructive malware can leave in its wake. According to a White House assessment, NotPetya caused serious business disruption across geographies and resulted in more than $10 billion in total damages. 

IBM X-Force IRIS’ team of veteran intelligence and response specialists have amassed data and real-world experience from responding to and analyzing a variety of destructive malware incidents. 

What is Destructive Malware? 
Destructive malware is malicious software with the capability to render affected systems inoperable and challenge reconstitution. Most destructive malware variants cause destruction through the deletion or wiping of les that are critical to the operating system’s ability to run. 

In a few cases, such as the Stuxnet worm, destructive malware used by nation-state actors and was designed to destroy industrial equipment by sending tailored messages to turbines that caused them to malfunction and become inoperable. 
Historically, destructive malware such as Stuxnet, Shamoon, and Dark Seoul, was primarily used by nation-state actors. However, especially since late 2018, cybercriminals have been incorporating wiper elements into their attacks, such as with new strains of ransomware like LockerGoga and MegaCortex. 

Who uses Destructive Malware, and why? 
Between the years 2010 and 2018, destructive malware was primarily used by nation-state actors to further state interests. A classic intent of destructive malware is to cause harm to a geopolitical opponent. Some examples include the destruction of nuclear centrifuges in Iran, or debilitating operations of key industry organisations worldwide. 

Cybercriminals may be adopting these destructive elements to add pressure to their demands that victims pay the ransom, adding irreparable data destruction to encryption as a potential repercussion. Alternatively, criminals may be using wiper malware to lash out at victims if they feel wronged, using destructive attacks more impulsively rather than strategically. 

The impact and cost of Destructive Malware 
The amount of damage companies experience in a destructive malware attack can be difficult to quantify, but X-Force IRIS has assembled some informed estimations based on IBM’s analysis of several publicly disclosed attacks. 

On average, large multinational companies appear to incur costs around $239 million, per incident, according to our analysis of several publicly disclosed attacks. 

This number is 61 times greater than the cost of a typical data breach, which the Ponemon Institute places at $3.92 million on average for companies worldwide, underscoring the significant cost destructive malware attacks can incur. Yet it is apparent that the actors behind the activity are still human, and not robots.

IBM have tracked changes in behavior by destructive malware attackers when they find incident responders are conducting detection and containment work on networks they have compromised. They lose composure, unwittingly reveal their actions, and react in ways that can prevent them from accomplishing their objectives. 

Where is destructive malware going next? 
Based on data from our incident response teams, managed security services, and open source information, IBM X-Force IRIS assesses that destructive malware attacks are continuing to grow in popularity and effectiveness. As we move into the second half of 2019, additional cyber-criminal groups, particularly those intent on conducting ransomware attacks, are recognising the utility of having a wiping mechanism built into their tools. 

This type of mechanism can provide adversaries with additional options to pressure victims, while simultaneously increasing the risk of an attack that will require disaster recovery. 

This trend leads us to believe that more financially-motivated cybercriminal groups are likely to explore destructive malware as an option to incorporate into current attacks, a task made easier when dark web markets provide these tools at relatively humble costs. 

These tactics suggest that, at least at present, destructive malware tends to lay in the hands of the most advanced cybercriminal groups or nation-state actors. However, if the popularity of these tools continues to grow, destructive malware capabilities may become a reality for groups we tend to associate with lower levels of sophistication, such as some hacktivist groups or even terrorists. 

In terms of geographical focus, IBM anticipate that the effects of destructive malware attacks are likely to grow. 
For example, targets located in the United States and Europe are increasingly falling victim to destructive malware attacks using destructive ransomware such as LockerGoga and MegaCortex. 

Destructive malware attacks in the Middle East and Asia are likely to continue, and have the potential to spread to other geographies as well. It is wise to prepare for the scenario of a destructive attack in all parts of the globe. 

IBM-X-Force

You Might Also Read:

Malware Attacks Drop As Encrypted Attacks Increase

Alarming Trends In Data Theft:

 

« Five New Security Trends Relevant To Your Business
FBI Turns To Social Media To Track Shooters »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

UK Cyber Security Forum

UK Cyber Security Forum

UK Cyber Security Forum is a community interest group for cyber security companies in the UK.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

The Security Awareness Company (SAC)

The Security Awareness Company (SAC)

The Security Awareness Company provides cyber security awareness training programs for companies of all sizes.

Enosys Solutions

Enosys Solutions

Enosys Solutions is an IT security specialist with a skilled professional services team and 24x7 security operations centre servicing corporate and public sector organisations across Australia.

Riverside Research

Riverside Research

Riverside Research is a not-for-profit organization chartered to advance scientific research in areas including Trusted & Resilient Systems.

CTERA Networks

CTERA Networks

CTERA provides cloud storage solutions that enable service providers and enterprises to launch managed storage, backup, file sharing and mobile collaboration services using a single platform.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

ngCERT

ngCERT

ngCERT is the National Computer Emergency Response Team for Nigeria.

Aiuken Cybersecurity

Aiuken Cybersecurity

Aiuken is an international IT Security company, focused on communications and IT technologies, specialised in Security and Cloud Services solutions with high added value.

Ntirety

Ntirety

Ntirety Managed Security Services offer enterprise businesses the advanced tools, processes, and support to ensure your infrastructure, networks, and mission-critical applications are secure.

Phy-Cy.X Security Group

Phy-Cy.X Security Group

Phy-Cy.X specialize in the “Physics” of Information Security through both physical and cyber domains. We are not an IT company, we ARE an Information Security company.

Communications & Information Technology Regulatory Authority (CITRA)

Communications & Information Technology Regulatory Authority (CITRA)

CITRA is responsible for overseeing the telecommunications sector, monitoring and protecting the interests of users and service providers, and regulating the services of telecomms networks in Kuwait.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Parablu

Parablu

Parablu is a leading provider of data security and resiliency solutions for the digital enterprise.

FTx Identity

FTx Identity

FTx Identity is the world's most advanced age verification technology (AVT) and identity management system.

ARC Risk and Compliance

ARC Risk and Compliance

ARC Risk and Compliance is a consulting company comprised of a team of AML Specialists completely focused on anti-money laundering compliance and the technologies used to support compliance programs.