Ransomware is no stranger to corporate networks, as it poses huge risks and even larger recovery efforts that are quite costly. Successful ransomware attacks can result in locked systems, stolen identity and data held hostage, all of which can wreak chaos and disaster to the targeted organizations.
When ransomware reaches its target, it’s practically game over. The malware encrypts files and spreads to the entire system to maximize damage, which forces many companies to lock down networks to stop the propagation.
While encryption is used everywhere, it’s not to be confused with hashing or obfuscating files. Hashing and obfuscating techniques are helpful for evading detection tools, while ransomware takes your data hostage because of encryption.
Each uses different types of cryptography, from modern symmetric ciphers to asymmetric ciphers, the idea being to prevent any reverse operation without a key.
Many ransomware strains display a “special note” after the encryption, mandating that the only way to decrypt the files is to send Bitcoins to the criminals’ wallet. However, as we know, some forms of ransomware are decryptable, and the ransom doesn’t need to be paid, or the burden shouldn’t fall solely on cyber insurance. For example, Jigsaw, an ancient form of malware first coined in 2016, contains the key used to encrypt files in the source code. We recently saw this type of attack surface again this year within Morse code, proving that even as malware continues to evolve, criminals will use whatever works, meaning businesses need to be aware of not just evolving threats but also old ways of attack.
Recent attacks don’t just encrypt data. The malware is also able to exfiltrate critical information before encryption. As ransomware protection improves, especially with removal and recovery strategies, hackers are turning to using stolen data as new leverage so they can still threaten the victims if they don’t pay the ransom, creating a double ransomware threat.
We've recently observed threat actors adopting a “double extortion” model, in which they encrypt the target's data and not only demand a ransom for its return, but also leverage additional payment incentives to add pressure on the victim to pay the ransom. Some threat actors will even use a more targeted approach and threaten to publicly release or auction the data unless the victim pays up, a situation that highlights the risk of not meeting compliance within the EU’s General Data Protection Regulation (GDPR) and the hundreds of data privacy policies and laws. Two such examples are Conti and REvil, both on our 2021 Nastiest Malware list, who have been known to publish leaked data onto dark web sites if ransoms aren’t paid.
A critical way to improve cyber resilience — the ability to withstand attacks and ensure continued access to data — is to have a solid backup strategy. However, efforts can become futile if organizations forget to clearly list and identify their requirements, then don’t test their procedures regularly to prevent massive failures at the worst moments.
Data protection is all about risk mitigation, and you need to ask yourself a few key questions to have the most comprehensive plan:
- How does your data tie into your business operations or your revenue, and does the data need to be archived?
- Does the data live in a legacy system where it might be subject to regulatory frameworks which could expose your business to penalties if data is breached?
- What is the data your business can’t function without?
- How long might it take to restore that data?
- What might it cost to fully restore?
Cybercriminals will continue to refine their approaches and experiment with different business models, as evolutionary ransomware attacks place enormous stress on the availability of services and data streams.
While those adversaries will, without doubt, continue to look for additional ways to put pressure on victims to maximize their chances of getting paid, you can be empowered to preserve what is most valuable to you today by deploying strong cyber resiliency practices, both now and in the future.
David Dufour is vice president of cybersecurity and threat intelligence engineering with Webroot and Carbonite, OpenText companies.