SlideShare a Scribd company logo
Ransomware Review of 2016
Ransomware got its start in the late 1980s, but 2016 can rightly
be called the year of ransomware. The most famous ransomware
attack of 2016 was against Hollywood Presbyterian Medical
Center in Los Angeles in March. The hospital paid a $17,000
ransom to decrypt itsdata.
Some interesting figures :
Malwarebytes reports that more than 26% of ransomware
attacks blocked by its cybersecurity software were aimed at US
According to the Federal Bureau of Investigation (FBI), more than
$209 million in ransomware payments were made in the US in
the first quarter of 2016. This was a 771 percent increase over a
reported $24 million for the whole of 2015.
Furthermore, attacks on businessincreased three-fold between
January and the end of September. Then In September the FBI
announced that there were 100,000 computers infected by
ransomware in a singleday.
It’s hard to believe that ransomware comprises less than one
percent of total infections.
And most ransomware attacks consumers, not businesses.
A recent IBM survey of 600 business leaders in the U.S. revealed
that almost half of all businesses have been hit by ransomware.
And of those, seventy percent have paid the ransom.
In 2015, the average ransom was a few hundred dollars per user.
According to the Trend Micro, at the end of 2016 the average
ransom was over $700, with 20 percent of organizations reporting
demands for over $1300. Even after paying the ransom, Trend
Micro has found that one in five organizations never get their data
back.
Ransomware can affect any type of computer. It became the
biggest cyberthreat on Android devices in the first half of 2016
in the U.S., U.K., Germany, Australia and Denmark. According to
Bitdefender, ransomware constituted more than half of the
malware detected.
General queries: info@titanhq.com www.titanhq.com
Whyhas ransomwarebecome such as menace?
There are many reasons for the upswing in ransomware:
Bitcoin has become an easier and more accepted form of
payment. Attackers prefer a currency that does not involve
financial institutions, both for traceability and for international
currency purposes. These requirements are met by Bitcoin.
Bitcoin transactions are not anonymous but require significant
effort to be accurately traced and can even be “laundered”
as moneyis.
Attackers want strong encryption to prevent users from
recovering files unless they pay a ransom. It is only recently
that higher-level encryption technology such as 2048-bit
version of the RSA cryptographic algorithm has become
more widely available.
Asymmetric (public key) encryption is widely available on even
the oldest computers in use. Many of the recent generations of
ransomware use a combination of symmetric and asymmetric
encryption. Symmetric encryption is fast. This is an advantage
because it has a higher probability of completing encryption
before the infection isdiscovered.
If the victim discovers the symmetric key before encryption is
complete, the data can be decrypted. Asymmetric encryption is
slower but more secure. Attackers can encrypt the victim’s files
rapidly using symmetric encryption and then employ asymmetric
encryption to encrypt the symmetric key. As a result, the more
secure but slower asymmetric method is needed to encrypt only
one file.
There is money to be made. Cybercriminals know that it is a
lucrative business model. As of December, SamSa ransomware
extortionists earned $450K by targeting primarily healthcare
organizations.
Attackers no longer need to be tech-savvy since most
ransomware is available as packaged exploit kits.
RANSOMWAREREVIEW2016 & WHAT’SAHEADFOR 2017
Well-established ransomware such as CTB-Locker, CryptoWall
and Shade were joined by Cerber, CryptXXX, and Locky. Locky
has so far been spread across 114 countries. The year saw
increasing variation in the construction of ransomware and the
vectors usedto deliver it.
General queries: info@titanhq.com www.titanhq.com
Types of ransomware in 2016
At the start of 2016, TeslaCrypt and Locky were the biggest
ransomware threats, spread by spam attacks. It appears that
many businesses affected by the onslaught beefed up their
security. As a result, ransomware increasingly affected
consumers as opposed to businesses as 2016 progressed.
File sharingboth within the institution and with outsiders is high
compared with other industries. A BitSight report released earlier
this year found that about 58% of academic institutions allowed
file sharing on theirnetworks.
Some security analysts believe that schools may be more likely
to pay for the information to avoid HIPAA concerns and other
regulatory violations. For example, In June, the University of
Calgary paid a $20,000 CDN ransom after attackers encrypted
its email system.
Education is a target formultiple reasons:
The sector tends to have smaller budgets, and thus less
up-to-date hardware and software. Education normally has
smaller IT staffs than other industries, so there are fewer
software updates and securitymonitoring.
The lowest risk was in the financial sector, with only 1.5% of
companies affected.
3.5% of healthcare organizations.
6% of government agencies
Ransomware has hitabout:
Which industriesare the most at risk
fromRansomware?
Some of the most publicized attacks in 2016 involved
healthcare, but the problem is more widespread. A new report
from BitSight declares education is the industry most likely to
be hit, with 13% of educational organization slammed by
ransomware. The report analyzed the cybersecurityperformance
of nearly 20,000 companies across government, healthcare,
finance, retail, education, and energy/utilities.
No More Ransom offers victims a Crypto Sheriff tool to determine
the type of ransomware affecting their devices. If available, tools
are then employed to decrypt the victims’ data. In December, 32
new decryption tools for various ransomware variants were added.
No More Ransomware Project
The most significant anti-ransomware move was the foundation
of the No More Ransom project. Kaspersky Lab, Intel Security,
the National High Tech Crime Unit of the Netherlands' police,
and Europol's European Cybercrime Centre formed the group.
In October, law enforcement agencies from 13 additional countries
joined the project, twelve in Europe in addition to Colombia.
The project expanded further in December with 30 more members.
The Franchise Model & Ransomware
The franchise model invaded the ransomware world.
CTB Locker and Chimera offered its victims an opportunity to
become an “affiliate”, with a 50 percent commission for selling
the ransomware as a service. Popcorn Time ransomware
waives payment from its victims if they try to infect a few friends.
At the beginning of 2016 CryptoWall 4.0 attacks rose, including
a new variation targeting outdated versions of Flash Player. The
payload was delivered via malicious pop-under ads whereas the
majority of past ransomware used spam, phishing emails, and
attachments. In November, it was discovered that Cerber 5.0.1
ransomware was spreading via Google and Tor2Web proxies.
New ransomware families appeared in different programming
languages, such as JavaScript, PHP, PowerShell, or Python.
VindowsLocker ransomware emerged in November. It locks up a
victim's computer and then asks the person to call a Microsoft
customer support number for help. When the user pays the over
$300 fee for decryption, he is hung out to dry.
There were new functions and threats added to ransomware as
well. Ransoc has been tailored to gather information on the
victim. Social media profiles and local files are probed, and
users whose PCs contain questionable content are threatened
with court action if they fail to pay the ransom. CryptXXX has a
feature to gather Bitcoin wallet data and send it to the attackers.
Some Cerber ransomware infects the victim’s computer with a
botnet to carry out distributed denial of service (DDoS) attacks.
Chimera threatens to post the victim’s files, including pictures
and videos, on theinternet.
RANSOMWARE REVIEW 2016&WHAT’S AHEAD FOR2017
An interesting forecast was made by Wendy Nather, research
director at the Retail Cyber Intelligence Sharing Center, in an
SC Magazine article (https://www.scmagazine.com/ransom-
ware-2017-dead-or-alive/article/577732/ )
General queries: info@titanhq.com www.titanhq.com
She is dreading the advent of “integrity attacks” where
cybercriminals alter an organization’s data. “The more insidious
prospect would be for a criminal group to claim that they made
such an alteration, but actually didn't,” she says.
“It's almost impossible to prove a negative, but it will tie up
the victim nonetheless as they try to confirm or deny it.”
Microsoft reported that Windows 10 is 58% less likely to be
affected by ransomware than Windows 7.
In May, TeslaCrypt shut down and the master decryption key
was released.
Police shut down Encryptor RaaS and Wildfire variants.
In July, about 3,500 keys for Chimera were publicly released.
Othergood newsontheransomwarefrontincludes:
White hats continued to attack command and control servers.
Increased use of cloudbackup
Continued law enforcement actions
Some analysts see the Internet of Things (IoT) as the next big
target. McAfee predicts that ransomware will attack Internet-
enabled medical devices. More than a few security experts
believe that cars will be held for ransom in 2017. Attacks on
IoT have already begun; consider the San Francisco Muni event
at the end of2016.
But the Federal Trade Commission and the Federal
Communications Commission declared in December that IoT
security will be a top enforcement priority for 2017. This decision
was made after the recent DDoS attacks against Dyn, causing
outages of many popular websites.
The availability of new antiransomwaretechnologies
The No More Ransom project
What does 2017hold?
Most security experts think that in 2017 ransomware will continue
to be one of the biggest security problems across computing
devices. They foresee further mutation of coding, techniques,
and delivery mechanisms. From an insurer’s point of view, the
Beazley Breach Insights report predicts ransomware attacks
against businesses will be four times higher in 2017 than last year.
It is predicted that attacks will peak in mid-2017 and then start to
fall off for a combination ofreasons:
As the number of ransomware families explodes and new
variants come out at a rapid pace criminals are expected to
collect at least $5 billion in 2017. A rigorous data protection
program that includes the routine creation of on-premise,
cloud and offline backups will remain the only effective
mechanism for defeating ransomware attacks.
Conclusion
In terms of the network security landscape it’s been a bumpy
ride in 2016, and ransomware will continue to provide some
further bumps for 2017. In 2017, ransomware will become more
virulent and widespread. The ransomware epidemicwill continue
to grow exponentially.
RANSOMWARE REVIEW 2016&WHAT’S AHEAD FOR2017

More Related Content

What's hot

HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
Parsons Behle & Latimer
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
Taylre Janak
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
Комсс Файквэе
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
Blueliv
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
Labris Networks
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
- Mark - Fullbright
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
Roen Branham
 
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-GuideStep FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
chrismannering
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
Kim Jensen
 
IBM X-Force Threat Intelligence
IBM X-Force Threat Intelligence IBM X-Force Threat Intelligence
IBM X-Force Threat Intelligence
Rod Delwar
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
Soluciona Facil
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
- Mark - Fullbright
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
Cigniti Technologies Ltd
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack
ZeroFOX
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?
Valerie Lanzone
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
Diego Souza
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
Kate Dalakova
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Jay Beale
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
SurfWatch Labs
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
Ulf Mattsson
 

What's hot (20)

HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
Network Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan BankersNetwork Insights of Dyre and Dridex Trojan Bankers
Network Insights of Dyre and Dridex Trojan Bankers
 
2015 Labris SOC Annual Report
2015 Labris SOC Annual Report2015 Labris SOC Annual Report
2015 Labris SOC Annual Report
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
Step FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-GuideStep FWD IT_Ransomware-Guide
Step FWD IT_Ransomware-Guide
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
IBM X-Force Threat Intelligence
IBM X-Force Threat Intelligence IBM X-Force Threat Intelligence
IBM X-Force Threat Intelligence
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack
 
Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
2019 06-05-dalakova-kateryna-mkm-mmt-pov-assignment (1)
 
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
Crypto-Jacking, Ransomware & Worming Malware's Frightening Future (Keynote an...
 
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
How to Reduce Avenues of Attack: Using Intel to Plan for Cyber Threats in 2017
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 

Similar to Ransomware Review 2017

The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
helen23456789
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
HiYeti1
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
Roel Palmaers
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connection
ESET Middle East
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
Andrey Apuhtin
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
malvvv
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
Protected Harbor
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
write12
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
bkbk37
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
Shreedeep Rayamajhi
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
Sergio Renteria Nuñez
 
McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019 McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019
BAKOTECH
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Roger Hagedorn
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
Cyphort
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
EMC
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
Agnieszka Guźniczak-Beim
 
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech TalentRansomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
LUMINATIVE MEDIA/PROJECT COUNSEL MEDIA GROUP
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Black Duck by Synopsys
 

Similar to Ransomware Review 2017 (20)

The Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docxThe Real Threat of CyberattacksEmmanuel .docx
The Real Threat of CyberattacksEmmanuel .docx
 
Ransomware (1).pdf
Ransomware (1).pdfRansomware (1).pdf
Ransomware (1).pdf
 
Your money or your files
Your money or your filesYour money or your files
Your money or your files
 
Cybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connectionCybersecurity Trends 2018: The costs of connection
Cybersecurity Trends 2018: The costs of connection
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
Rpt paradigm shifts
Rpt paradigm shiftsRpt paradigm shifts
Rpt paradigm shifts
 
The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Discuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docxDiscuss similarities and differences between and Trojan.docx
Discuss similarities and differences between and Trojan.docx
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Case Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks TelefónicaCase Study: Wannacry Ransomware attacks Telefónica
Case Study: Wannacry Ransomware attacks Telefónica
 
McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019 McAfee Labs Threats Report, August 2019
McAfee Labs Threats Report, August 2019
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013RSA Monthly Online Fraud Report -- August 2013
RSA Monthly Online Fraud Report -- August 2013
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech TalentRansomware Gang Masquerades as Real Company to Recruit Tech Talent
Ransomware Gang Masquerades as Real Company to Recruit Tech Talent
 
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...Open Source Insight: Artifex Ruling, NY Cybersecurity Regs,  PATCH Act, & Wan...
Open Source Insight: Artifex Ruling, NY Cybersecurity Regs, PATCH Act, & Wan...
 

More from Dryden Geary

Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
Dryden Geary
 
Making ArcTitan Email Archiving work with office365
Making ArcTitan Email Archiving work with office365Making ArcTitan Email Archiving work with office365
Making ArcTitan Email Archiving work with office365
Dryden Geary
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
Dryden Geary
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
Dryden Geary
 
WebTitan for Service Providers, Web Filtering for Service Providers
WebTitan for Service Providers, Web Filtering for Service Providers WebTitan for Service Providers, Web Filtering for Service Providers
WebTitan for Service Providers, Web Filtering for Service Providers
Dryden Geary
 
SpamTitan Cloud - email anti-spam and email filtering for business
SpamTitan Cloud - email anti-spam and email filtering for business SpamTitan Cloud - email anti-spam and email filtering for business
SpamTitan Cloud - email anti-spam and email filtering for business
Dryden Geary
 
ArcTitan Cloud - Email Archiving Solution
ArcTitan Cloud - Email Archiving Solution ArcTitan Cloud - Email Archiving Solution
ArcTitan Cloud - Email Archiving Solution
Dryden Geary
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
Dryden Geary
 
How Web Filtering For Wifi Works
How Web Filtering For Wifi WorksHow Web Filtering For Wifi Works
How Web Filtering For Wifi Works
Dryden Geary
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Dryden Geary
 
How Cloud Web Filtering Works - Web Titan Cloud For WiFi
How Cloud Web Filtering Works - Web Titan Cloud For WiFi How Cloud Web Filtering Works - Web Titan Cloud For WiFi
How Cloud Web Filtering Works - Web Titan Cloud For WiFi
Dryden Geary
 

More from Dryden Geary (11)

Practical Guide to GDPR 2017
Practical Guide to GDPR 2017Practical Guide to GDPR 2017
Practical Guide to GDPR 2017
 
Making ArcTitan Email Archiving work with office365
Making ArcTitan Email Archiving work with office365Making ArcTitan Email Archiving work with office365
Making ArcTitan Email Archiving work with office365
 
Tips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklistedTips to prevent your email ip being blacklisted
Tips to prevent your email ip being blacklisted
 
DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware DNS Security WebTitan Web Filter - Stop Malware
DNS Security WebTitan Web Filter - Stop Malware
 
WebTitan for Service Providers, Web Filtering for Service Providers
WebTitan for Service Providers, Web Filtering for Service Providers WebTitan for Service Providers, Web Filtering for Service Providers
WebTitan for Service Providers, Web Filtering for Service Providers
 
SpamTitan Cloud - email anti-spam and email filtering for business
SpamTitan Cloud - email anti-spam and email filtering for business SpamTitan Cloud - email anti-spam and email filtering for business
SpamTitan Cloud - email anti-spam and email filtering for business
 
ArcTitan Cloud - Email Archiving Solution
ArcTitan Cloud - Email Archiving Solution ArcTitan Cloud - Email Archiving Solution
ArcTitan Cloud - Email Archiving Solution
 
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
TitanHQ WebTitan Web Filtering Presentation at Wifi Now London 2016 - DNS Fil...
 
How Web Filtering For Wifi Works
How Web Filtering For Wifi WorksHow Web Filtering For Wifi Works
How Web Filtering For Wifi Works
 
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
Web Content Filtering for Education and Schools - Webtitan Cloud Reseller Pre...
 
How Cloud Web Filtering Works - Web Titan Cloud For WiFi
How Cloud Web Filtering Works - Web Titan Cloud For WiFi How Cloud Web Filtering Works - Web Titan Cloud For WiFi
How Cloud Web Filtering Works - Web Titan Cloud For WiFi
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Ransomware Review 2017

  • 1. Ransomware Review of 2016 Ransomware got its start in the late 1980s, but 2016 can rightly be called the year of ransomware. The most famous ransomware attack of 2016 was against Hollywood Presbyterian Medical Center in Los Angeles in March. The hospital paid a $17,000 ransom to decrypt itsdata. Some interesting figures : Malwarebytes reports that more than 26% of ransomware attacks blocked by its cybersecurity software were aimed at US According to the Federal Bureau of Investigation (FBI), more than $209 million in ransomware payments were made in the US in the first quarter of 2016. This was a 771 percent increase over a reported $24 million for the whole of 2015. Furthermore, attacks on businessincreased three-fold between January and the end of September. Then In September the FBI announced that there were 100,000 computers infected by ransomware in a singleday. It’s hard to believe that ransomware comprises less than one percent of total infections. And most ransomware attacks consumers, not businesses. A recent IBM survey of 600 business leaders in the U.S. revealed that almost half of all businesses have been hit by ransomware. And of those, seventy percent have paid the ransom. In 2015, the average ransom was a few hundred dollars per user. According to the Trend Micro, at the end of 2016 the average ransom was over $700, with 20 percent of organizations reporting demands for over $1300. Even after paying the ransom, Trend Micro has found that one in five organizations never get their data back. Ransomware can affect any type of computer. It became the biggest cyberthreat on Android devices in the first half of 2016 in the U.S., U.K., Germany, Australia and Denmark. According to Bitdefender, ransomware constituted more than half of the malware detected. General queries: info@titanhq.com www.titanhq.com Whyhas ransomwarebecome such as menace? There are many reasons for the upswing in ransomware: Bitcoin has become an easier and more accepted form of payment. Attackers prefer a currency that does not involve financial institutions, both for traceability and for international currency purposes. These requirements are met by Bitcoin. Bitcoin transactions are not anonymous but require significant effort to be accurately traced and can even be “laundered” as moneyis. Attackers want strong encryption to prevent users from recovering files unless they pay a ransom. It is only recently that higher-level encryption technology such as 2048-bit version of the RSA cryptographic algorithm has become more widely available. Asymmetric (public key) encryption is widely available on even the oldest computers in use. Many of the recent generations of ransomware use a combination of symmetric and asymmetric encryption. Symmetric encryption is fast. This is an advantage because it has a higher probability of completing encryption before the infection isdiscovered. If the victim discovers the symmetric key before encryption is complete, the data can be decrypted. Asymmetric encryption is slower but more secure. Attackers can encrypt the victim’s files rapidly using symmetric encryption and then employ asymmetric encryption to encrypt the symmetric key. As a result, the more secure but slower asymmetric method is needed to encrypt only one file. There is money to be made. Cybercriminals know that it is a lucrative business model. As of December, SamSa ransomware extortionists earned $450K by targeting primarily healthcare organizations. Attackers no longer need to be tech-savvy since most ransomware is available as packaged exploit kits. RANSOMWAREREVIEW2016 & WHAT’SAHEADFOR 2017
  • 2. Well-established ransomware such as CTB-Locker, CryptoWall and Shade were joined by Cerber, CryptXXX, and Locky. Locky has so far been spread across 114 countries. The year saw increasing variation in the construction of ransomware and the vectors usedto deliver it. General queries: info@titanhq.com www.titanhq.com Types of ransomware in 2016 At the start of 2016, TeslaCrypt and Locky were the biggest ransomware threats, spread by spam attacks. It appears that many businesses affected by the onslaught beefed up their security. As a result, ransomware increasingly affected consumers as opposed to businesses as 2016 progressed. File sharingboth within the institution and with outsiders is high compared with other industries. A BitSight report released earlier this year found that about 58% of academic institutions allowed file sharing on theirnetworks. Some security analysts believe that schools may be more likely to pay for the information to avoid HIPAA concerns and other regulatory violations. For example, In June, the University of Calgary paid a $20,000 CDN ransom after attackers encrypted its email system. Education is a target formultiple reasons: The sector tends to have smaller budgets, and thus less up-to-date hardware and software. Education normally has smaller IT staffs than other industries, so there are fewer software updates and securitymonitoring. The lowest risk was in the financial sector, with only 1.5% of companies affected. 3.5% of healthcare organizations. 6% of government agencies Ransomware has hitabout: Which industriesare the most at risk fromRansomware? Some of the most publicized attacks in 2016 involved healthcare, but the problem is more widespread. A new report from BitSight declares education is the industry most likely to be hit, with 13% of educational organization slammed by ransomware. The report analyzed the cybersecurityperformance of nearly 20,000 companies across government, healthcare, finance, retail, education, and energy/utilities. No More Ransom offers victims a Crypto Sheriff tool to determine the type of ransomware affecting their devices. If available, tools are then employed to decrypt the victims’ data. In December, 32 new decryption tools for various ransomware variants were added. No More Ransomware Project The most significant anti-ransomware move was the foundation of the No More Ransom project. Kaspersky Lab, Intel Security, the National High Tech Crime Unit of the Netherlands' police, and Europol's European Cybercrime Centre formed the group. In October, law enforcement agencies from 13 additional countries joined the project, twelve in Europe in addition to Colombia. The project expanded further in December with 30 more members. The Franchise Model & Ransomware The franchise model invaded the ransomware world. CTB Locker and Chimera offered its victims an opportunity to become an “affiliate”, with a 50 percent commission for selling the ransomware as a service. Popcorn Time ransomware waives payment from its victims if they try to infect a few friends. At the beginning of 2016 CryptoWall 4.0 attacks rose, including a new variation targeting outdated versions of Flash Player. The payload was delivered via malicious pop-under ads whereas the majority of past ransomware used spam, phishing emails, and attachments. In November, it was discovered that Cerber 5.0.1 ransomware was spreading via Google and Tor2Web proxies. New ransomware families appeared in different programming languages, such as JavaScript, PHP, PowerShell, or Python. VindowsLocker ransomware emerged in November. It locks up a victim's computer and then asks the person to call a Microsoft customer support number for help. When the user pays the over $300 fee for decryption, he is hung out to dry. There were new functions and threats added to ransomware as well. Ransoc has been tailored to gather information on the victim. Social media profiles and local files are probed, and users whose PCs contain questionable content are threatened with court action if they fail to pay the ransom. CryptXXX has a feature to gather Bitcoin wallet data and send it to the attackers. Some Cerber ransomware infects the victim’s computer with a botnet to carry out distributed denial of service (DDoS) attacks. Chimera threatens to post the victim’s files, including pictures and videos, on theinternet. RANSOMWARE REVIEW 2016&WHAT’S AHEAD FOR2017
  • 3. An interesting forecast was made by Wendy Nather, research director at the Retail Cyber Intelligence Sharing Center, in an SC Magazine article (https://www.scmagazine.com/ransom- ware-2017-dead-or-alive/article/577732/ ) General queries: info@titanhq.com www.titanhq.com She is dreading the advent of “integrity attacks” where cybercriminals alter an organization’s data. “The more insidious prospect would be for a criminal group to claim that they made such an alteration, but actually didn't,” she says. “It's almost impossible to prove a negative, but it will tie up the victim nonetheless as they try to confirm or deny it.” Microsoft reported that Windows 10 is 58% less likely to be affected by ransomware than Windows 7. In May, TeslaCrypt shut down and the master decryption key was released. Police shut down Encryptor RaaS and Wildfire variants. In July, about 3,500 keys for Chimera were publicly released. Othergood newsontheransomwarefrontincludes: White hats continued to attack command and control servers. Increased use of cloudbackup Continued law enforcement actions Some analysts see the Internet of Things (IoT) as the next big target. McAfee predicts that ransomware will attack Internet- enabled medical devices. More than a few security experts believe that cars will be held for ransom in 2017. Attacks on IoT have already begun; consider the San Francisco Muni event at the end of2016. But the Federal Trade Commission and the Federal Communications Commission declared in December that IoT security will be a top enforcement priority for 2017. This decision was made after the recent DDoS attacks against Dyn, causing outages of many popular websites. The availability of new antiransomwaretechnologies The No More Ransom project What does 2017hold? Most security experts think that in 2017 ransomware will continue to be one of the biggest security problems across computing devices. They foresee further mutation of coding, techniques, and delivery mechanisms. From an insurer’s point of view, the Beazley Breach Insights report predicts ransomware attacks against businesses will be four times higher in 2017 than last year. It is predicted that attacks will peak in mid-2017 and then start to fall off for a combination ofreasons: As the number of ransomware families explodes and new variants come out at a rapid pace criminals are expected to collect at least $5 billion in 2017. A rigorous data protection program that includes the routine creation of on-premise, cloud and offline backups will remain the only effective mechanism for defeating ransomware attacks. Conclusion In terms of the network security landscape it’s been a bumpy ride in 2016, and ransomware will continue to provide some further bumps for 2017. In 2017, ransomware will become more virulent and widespread. The ransomware epidemicwill continue to grow exponentially. RANSOMWARE REVIEW 2016&WHAT’S AHEAD FOR2017