With few options, companies increasingly yield to ransomware demands

Attackers view stolen or encrypted data as a powerful weapon

Faced with few options, companies are increasingly giving in to cybercriminals who hold their data hostage and demand payment for its return, while law enforcement officials struggle to catch the nearly invisible perpetrators.

The risks to organizations have become so severe that many simply pay their attackers to make them go away -- a strategy that may only embolden the crooks.

It's a case of asymmetric electronic warfare. Ransomware, which encrypts files until a victim pays to have them unlocked, can be devastating to an organization. Barring an up-to-date backup, little can be done aside from paying the attackers to provide the decryption keys.

Less common but just as harmful are extortion schemes, where attackers claim to have stolen critical data and threaten to publicly release it unless their demands are met. Timeframes are tight: Hackers may give a company less than 48 hours to comply, setting off a race to confirm what data, if any, has been stolen.

The costs of ransomware and extortion are difficult to calculate. Last June, the FBI estimated that the CryptoWall ransomware family alone had cost US organisations $US18 million over the prior year. In October, an industry group put the total cost of CryptoWall - which was first detected in mid-2014 - far higher, at a staggering $US325 million.

Extortion costs are even harder to estimate, since companies are often unwilling to admit they fell victim. Computer security company, FireEye, says it knows of companies that paid more than $US1,000,000 to prevent sensitive data being released, though most incidents are resolved for less.

The volume of cases is overwhelming law enforcement, said Erin Nealy Cox, a former federal cybercrime prosecutor and head of the incident response unit at Stroz Friedberg, which conducts computer forensic investigations.

The FBI and the Secret Service "in many cases are fine with in essence acquiescing to payment of the ransom," Nealy Cox said, though he emphasized that this is not their official position.

Groups conducting the attacks are difficult to find. They're experienced at covering their tracks and demand payment in the cryptocurrency bitcoin, which makes payments hard to trace. Also, the hackers are often based in countries that don't cooperate closely with the U.S. on cybersecurity, making arrests unlikely.

Unlocking the encrypted files is often near impossible.

"It's a a big challenge to decrypt victims," said Andrew Komarov, CIO of InfoArmor, which collects intelligence on cyberthreats.

InfoArmor has had some success in disrupting ransomware, by infiltrating the computer networks used to control it. In one example, Komarov said a vulnerability was found within the command-and-control network used to distribute ransomware called CryptoLocker.

cryptolocker warning Screenshot

The warning displayed by CryptoLocker, one of many ransomware programs.

The vulnerability allowed researchers to send a command that made it appear that thousands of victims had paid their ransom, causing their computers to be decrypted, according to InfoArmor's report.

But happy endings are uncommon. The most well-documented ransomware incidents have hit the medical industry. Hollywood Presbyterian Medical Center in Los Angeles paid 40 bitcoins -- about $US17,000 -- to decrypt its files.

Allen Stefanek, president and CEO of Hollywood Presbyterian, said the payment was "in the best interest of restoring normal operations."

Four weeks later, Methodist Hospital of Henderson, Kentucky, said a piece of ransomware known as Locky infected its systems, according to computer security writer Brian Krebs. The hospital did not pay a ransom but was able to restore its systems, according to a local news report.

Ransomware and extortion schemes offer advantages over other methods of cybercrime. Rather than stealing data and needing to find a buyer for it in risky transactions that take place in underground forums, a vulnerable victim is approached for payment directly.

"We're starting to see adversaries in many regions start thinking of data as a weapon," said Dmitri Alperovitch, CEO of Crowdstrike. "Certainly the North Koreans did that with Sony."

Sony Pictures, whose attackers released gigabytes of sensitive internal data and destroyed computers, was asked to not release a film that was seen as offensive to North Korean leader Kim Jong-un. The U.S. government quickly attributed the attack to North Korea.

Paying a ransom is a hang-wringing proposition and not one without its opponents.

Last month, Roman Hussy, who runs a security blog, launched a Ransomware Tracker -- a tool that catalogs servers around the world that have been tied to ransomware campaigns. He started the tracker after seeing many people become victims.

"The golden rule is performing backups frequently and never pay any ransoms," Hussy wrote. "Paying ransoms will fund the miscreants' cybercrime operation and the infrastructure that they are using to commit further fraud, as well as motivate the attackers to keep carrying out their attacks."

Hussy's resistance strategy might work eventually, but it would require many organizations to fall on their swords.

Kevin Mandia, chief operating officer of FireEye and founder of Mandiant, said the result of not paying could mean great risk and embarrassment -- if, for example, a company's general counsel's email is leaked.

"What would you do?" Mandia said in a recent interview. "The alternatives are pretty bad."

The uptick in ransomware and extortion attempts is likely an outgrowth of better payment card security in the U.S. Stolen card details are getting harder to monetize, so attackers have ound an easier route to generate cash.

FireEye has seen some of the same hacking tools and infrastructure use for state-sponsored cyberespionage now being used for extortion, suggesting experienced hackers see a gravy train.

"Finally, Russian organized crime and groups out of China realized, well, we still have the hacking skills, we're getting card data we can't monetize as easily anymore, so just extort," Mandia said.

On March 22, the Department of Justice unsealed charges against three members of the Syrian Electronic Army, a group that waged a multi-year hacking campaign in support of President Bashar al-Assad.

Two of the men are also accused of extorting 14 U.S. and international victims after hacking their systems and threatening to cause damage or sell stolen data. The victims included a Chinese online gaming company, a U.K. web hosting provider and an online media company.

All told, the men allegedly demanded more than $500,000, although they frequently lowered their demands after negotiation, according to the criminal complaint.

"Some of this is like hostage negotiations," Crowdstrike's Alperovitch said. "You can start the dialog with a criminal and see if you can stall them and get yourself more time."

But "nothing is foolproof when you're dealing with thieves," he said.

Join the PC World newsletter!

Error: Please check your email address.

Tags securityInfoArmorFireEyeCryptoWallfbiransomware

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Cool Tech

Crucial Ballistix Elite 32GB Kit (4 x 8GB) DDR4-3000 UDIMM

Learn more >

Gadgets & Things

Lexar® Professional 1000x microSDHC™/microSDXC™ UHS-II cards

Learn more >

Family Friendly

Lexar® JumpDrive® S57 USB 3.0 flash drive 

Learn more >

Stocking Stuffer

Plox Star Wars Death Star Levitating Bluetooth Speaker

Learn more >

Christmas Gift Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?