Ransomware surges in, and the data floods out

Paul will discuss how criminals are deploying ransomware and what business leaders need to know when it comes to protecting themselves against data leakage.
Paul Prudhomme, Head of Threat Intelligence Advisory, IntSights, raises awareness around the evolution of ransomware and current threats to business data. He discusses how criminals are deploying ransomware and what business leaders need to know when it comes to protecting themselves against data leakage.

Organisations today face an endless number of cyber threats, but ransomware remains one of the most feared. Ransomware has evolved from being a single-track extortion trick to a complex, multi-layer campaign. There are now far more risks to an organisation than simply losing a lump sum of money. Today, if ransomware takes hold, businesses could face brand damage, non-compliance penalties, lawsuit exposure and loss of sensitive data or intellectual property.

Unfortunately, many businesses are struggling to stay on top of ransomware defences and are left vulnerable to the militia of threats waiting to strike. Looking at the history of this particular cyber threat, we can better understand its direction and how it is likely to evolve further. Armed with this knowledge, organisations have a much better chance of defending against the relentless ransomware attempts launched by adversaries.

An increase in activity

Ransomware has left countless businesses bereft after they have fallen victim to ruthless hackers. The threats to organisations have increased as Ransomware-as-a-Service (RaaS) has gained popularity on the dark web, providing all criminals, no matter their skillset or expertise, with the opportunities to initiate their own ransomware attacks. Those with developed skillsets have moved beyond basic forms of ransomware attacks and now carry out campaigns with multiple forms of extortion. In fact, more than 30 ransomware groups operate according to a double extortion model, where attacks involve encrypted systems as well as a threat about stolen data.

In the past three years, we’ve also seen ransomware payments themselves increase dramatically. In 2018, the average ransom was less than $10,000; in Q3 2020, they had reached an overwhelming average demand of almost $250,000. Of course, different companies have different views on whether ransoms should be paid, but only when forced into that unthinkable position can individuals truly comprehend what is at stake.

The latest evolution

The group responsible for the latest directional shift goes by the name BABUK. This group recently published several press statements announcing that they will no longer encrypt networks as part of their attacks on businesses. There are a few implications from this change in focus:

  • Backups become obsolete.
  • Businesses will no longer be aware of their network is infected, even if it is up and running.
  • The previously respected ethical barriers have been torn down.

It is still important for businesses to maintain backups and ensure they stay detached from the network, but they will not protect companies from ransomware-related damage. ThisIn addition, this approach does not involve encrypting networks, so hackers could still breach the system and leave data-stealing malware without the business being aware. Finally, there was always an unwritten rule that critical infrastructure and healthcare organisations were exempt from ransomware targets – given their responsibility for human life. Now, however, these ethics no longer apply, with medical and educational institutions becoming some of the most targeted industries across the past year.

What the future of ransomware looks like

When considering the future of ransomware, we’re looking at three primary developments. The first being the transition of ransomware for mobile devices. Pretty much every working individual comes with at least one mobile device, making it a prime target for hackers. These small tools are packed full of data in the form of messages, pictures, saved passwords and contact details. As a result, we’re likely to see a surge in ransomware attempts on these devices, either through encryption or potentially just straight to extortion.

The Internet of Things (IoT) is one of the biggest growing markets in the technology industry today, and so, by default, it becomes another big target for hackers. Losing control of internet-connected devices poses greater threats beyond data theft; it could become physically dangerous. Many devices are now connected to the internet, including medical equipment, domestic appliances, and construction tools. Without the necessary forms of protection, these seemingly harmless devices could easily become threatening.

And finally, there is no cap on how high ransom demands could reach. As long as there are victims who are prepared to pay, hackers will continue to push the financial limits. Authorities have been advising individuals and companies not to pay ransoms as there is no guarantee that criminals will not look to exploit you again further down the line. Once you’ve shown that you’re prepared to pay, they’ll keep you in their sights.

Forms of protection

Whilst it’s impossible to predict and defend against every attack on a company’s data, there is plenty that businesses can do to make it as hard as possible for criminals to hack their way in. Firstly, given that phishing campaigns are a commonly used method of planting ransomware, it is vital that companies hold awareness training programmes for employees in order to stop these intruders at the door. This, when combined with advanced firewalls and email protection solutions, helps strengthen the first line of defence.

It’s also important to patch known vulnerabilities and keep software updated. This may seem obvious, but there are still many businesses lacking in basic cyber hygiene. Additionally, deploying a strict closed ports policy, or tight credentials change policy, is a further way companies can prevent data leakage through ransomware. It only takes one weak entrance to the network to grant hackers free reign.

READ MORE:

Unfortunately, regardless of what solutions are developed in the years to come, the threat of ransomware is not going to go away. Through RaaS, this form of attack has become accessible to every level of hacker without the need for specialised skillsets. As we’ve seen, the ransomware landscape can take a complete 180-degree turn in a matter of years, so it is vital that organisations across the board stay vigilant and maintain their awareness of the threats on their company data.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...

Automated Testing Tools and Their Impact on Software Quality

Natalia Yanchii • 09th October 2024

Test automation refers to using specialized software tools and frameworks to automate the execution of test cases, thereby reducing the time and effort required for manual testing. This approach ensures that automation tests run quickly and consistently, allowing development teams to identify and resolve defects more effectively. Test automation provides greater accuracy by eliminating human...

Custom Software Development

Natalia Yanchii • 04th October 2024

There is a wide performance gap between industry-leading companies and other market players. What helps these top businesses outperform their competitors? McKinsey & Company researchers are confident that these are digital technologies and custom software solutions. Nearly 70% of the top performers develop their proprietary products to differentiate themselves from competitors and drive growth. As...

The Impact of Test Automation on Software Quality

Natalia Yanchii • 04th October 2024

Software systems have become highly complex now, with multiple interconnected components, diverse user interfaces, and business logic. To ensure quality, QA engineers thoroughly test these systems through either automated or manual testing. At Testlum, we met many software development teams who were pressured to deliver new features and updates at a faster pace. The manual...