Spooked by Spike in Cyber Extortion, Businesses are Stockpiling Bitcoin for PayoffsPosted: February 17, 2017
Paying ransom just invites the next attack.
Tim Johnson reports: U.S. corporations that have long resisted bending to the demands of computer hackers who take their networks hostage are increasingly stockpiling bitcoin, the digital currency, so that they can quickly meet ransom demands rather than lose valuable corporate data.
The companies are responding to cybersecurity experts who recently have changed their advice on how to deal with the growing problem of extortionists taking control of the computers.
“It’s a moral dilemma. If you pay, you are helping the bad guys,” said Paula Long, chief executive of DataGravity, a Nashua, New Hampshire, company that helps clients secure corporate data. But, she added, “You can’t go to the moral high ground and put your company at risk.”
“A lot of companies are doing that as part of their incident response planning,” said Chris Pogue, chief information security officer at Nuix, a company that provides information management technologies. “They are setting up bitcoin wallets.”
Pogue said he believed thousands of U.S. companies had prepared strategies for dealing with hacker extortion demands, and numerous law firms have stepped in to facilitate negotiations with hackers, many of whom operate from the other side of the globe.
Symantec, a Mountain View, California, company that makes security and storage software, estimates that ransom demands to companies average between $10,000 and $75,000 for hackers to provide keys to decrypt frozen networks. Individuals whose computers get hit pay as little as $100 to $300 to unlock their encrypted files.
Companies that analyze cyber threats say the use of ransomware has exploded, and payments have soared. Recorded Future, a Somerville, Massachusetts, threat intelligence firm, says ransom payments skyrocketed 4,000 percent last year, reaching $1 billion. Another firm, Kaspersky Lab, estimates that a new business is attacked with ransomware every 40 seconds.
“If you’re hit by ransomware today, you have only two options: You either pay the criminals or you lose your data,” said Raj Samani, chief technical officer at Intel Security for Europe, the Middle East and Africa. “We underestimated the scale of the issue.”
Hackers often send out email with tainted hyperlinks to broad targets, say, an entire company. All it takes is one computer user in a company to click on the infected link to allow hackers to get a foothold in the broader network, leading to hostile encryption.
“At least one employee will click on anything,” said Robert Gibbons, chief technology officer at Datto, a Connecticut company that offers digital disaster recovery services.
Law enforcement counsels U.S. businesses not to succumb to ransom demands, urging them to keep backup copies of their data in case of hostile encryption.
“The official FBI policy is that you shouldn’t pay the ransom,” said Leo Taddeo, chief security officer for Cryptzone, a Waltham, Massachusetts, company that provides network security. Until 2015, Taddeo ran the cyber division of the FBI’s New York City office.
But practical considerations increasingly are dictating a different approach. “It’s an option to pay the ransom to get back up and running. Sometimes it’s the only option,” Taddeo said.
“But it has downsides,” he added. “Paying ransom just invites the next attack.”
Moreover, 1 in 4 companies that pay ransoms never get their files restored, Gibbons said. … (read more)
Source: The Star-Telegram
- Senior manager at Kaspersky Lab cybersecurity firm arrested in Moscow (news.nationalpost.com)
- Russia Detains 9 Hackers for Alleged Involvement in $17 Million Banking Theft Plot (wccftech.com)
- Over 100 banks, telecom and government institutions targeted by ‘fileless’ malware (neowin.net)
- Kaspersky researcher on Russian ransomware ecosystem (avien.net)
- Russian-speaking cybercriminals created over 75% of all crypto ransomware (helpnetsecurity.com)