A quick guide to some ransomware basics for your practice!
By: Hart Johnson, MSCSIA, CEH, CHFI
You have probably heard of it by now, but ransomware isn’t going anywhere! Ransomware is gaining popularity and steam around the world, and organizations big and small can fall victim to it. In this blog, we will build upon some of the other Security and Technology Blogs we have written to touch on this very scary, but important topic.
Ransomware is a type of malware. This particular type of malware typically encrypts (basically scrambles) your files on your machine, so that you have to pay a ransom to decrypt (unscramble) the files. This payment is typically due in the form of cryptocurrency such as Bitcoin. Typically, once infected, you are presented with instructions on your device of how to pay the ransom and decrypt your files. The costs can vary, depending on the size, ranging from hundreds for individuals to millions of dollars for large organizations. There are newer types of ransomware attacks as well, where the attackers care less about encrypting your files, and more about exfiltrating (removing/copying) the data so that they can hold it hostage for ransom in order to not release them to the public. Either way, ransomware is scary, BUT with some good security measures in place, you can protect yourself and your organization. Please note, this blog is not meant to provide you with a full security solution and does not guarantee that by implementing some of the recommendations that you will be immune from ransomware, this is just some tips to help you think about ways to help protect your assets.
First, the attacker has to infect its target. This can be done from a variety of sources, but one of the main sources is through phishing. You can read up about phishing in our Phishing Blog Post.
Essentially, once infected, the ransomware can either trick a user into installing it or use a security hole in the machine to infect it automatically. At this point, the ransomware malware will typically begin encrypting some or all of the files on the machine, might spread to other networked computers with the same vulnerabilities, and even potentially shut down your entire IT infrastructure.
At this point, your files are encrypted and you are losing valuable time, data, and more from this attack. Part of the reason we are seeing a rise in high profile ransomware attacks is because they are not very technologically difficult to pull off and these large organizations are more willing to pay to gain access to their systems again, as they are losing revenue quickly.
There is also the potential for the ransomware to be a decoy, in order to put something even more malicious onto your machines, that can cause even more issues down the road. Gaining a foothold in your network could lead to more breaches.
Ransomware can have a wide-variety of different consequences. It can be as simple as losing access temporarily to information you need to even more malicious breaches like personal and secret information becoming published. Imagine for example, that you have downloaded some patient records to print out or send, and you are hit with ransomware that takes, and publishes that sensitive information. You now have a major breach of health information on your hands! What if the attackers install a key-logger on your machine, and get access to your passwords for all of your sensitive data? That could lead towards a large-scale breach of PHI!
Billions of dollars are lost each year to ransomware in the US alone due to:
The other issue is that there is no promise that your files will actually be decrypted and no promise that the malware is actually removed from your system after paying the ransom. You have to remember, we are dealing with criminals here, who do not have your best interest in mind.
So what can you do to help protect and minimize the risk of ransomware?
While this is not an exhaustive list by any means, these are some good first steps. It is always best to consult with a cybersecurity specialist, to ensure you are taking the most appropriate precautions based on your organization’s individual risk factors.
Great question! Immediately, unplug your computer from any ethernet cables and turn off your Wi-Fi at the router. Essentially, shut down your network immediately to help prevent spread. Put your device in airplane mode if possible and turn off Wi-Fi and Bluetooth if you can.
Immediately disconnect everything from your computer. Hard drives, USB sticks, anything else that can be compromised, get it off immediately!
Report the incident up your normal chain of command and consult a cybersecurity specialist to talk through remediation steps.
We hope this blog is helpful and will continue this series with more information in the future.