Imagine if someone replaced the locks on your home, preventing you from entering until you paid them a hefty fee. That’s the essential concept behind ransomware. A form of malicious software (malware) that encrypts files or systems and denies access to them until a ransom is paid. Here’s how it works.
Ransomware most commonly finds its way onto computers by someone clicking a malicious link or downloading an infected attachment via phishing emails. Attackers also use stolen login credentials to launch the malware via remote desktop technology, where they gain control of someone’s computer remotely.
Ransomware encrypts data in a manner that doesn’t impact a system’s stability. Some variants can spread to other computers on the network and even seek out data backups to destroy them.
A typical ransom note explains what has happened and includes instructions for how to pay the ransom, as well as the consequences of not paying by a specific deadline. In some cases, the attackers will offer to decrypt one file for free to prove that the decryption keys works.
- Double Extortion
As if losing access wasn’t enough, advanced ransomware thieves further leverage their position by first extracting confidential data before encrypting it, then threatening to publicize it or sell it if the victim refuses to pay. This process of double extortion pressures organizations into paying.
- To Pay or Not To Pay
If a ransomware victim doesn’t pay, they risk the chance of losing data forever and, in the case of double extortion, having that data exposed.
If they do pay, there is no guaranteed that the attackers will provide the necessary decryption keys and, in the case of double extortion, the victim still has no way of preventing the attacker from selling or leaking the data.
In short, ransomware is always a losing situation. You can help avoid it by staying alert, thinking before clicking, and always following policies.
The Ransomware Business Model
Modern ransomware attacks now feature an almost corporate structure of partners who team up to create a model called “ransomware as a service,” or RaaS. Let’s explore an example of what the modern ransomware business model looks like:
|These are the people who develop the ransomware and sell it to others in what has become known as an affiliate program, a subscription-based service for renting the malware.||No business can be successful without Great customer service. Ransomware groups have been known to offer live chat support to help victims send payment and decrypt their data.|
|Affiliates are the customers in this situation. They pay a subscription fee and earn a percentage of the profits from successful attacks. They are also the ones who launch ransomware attacks.||Some ransomware groups openly communicate with the press. They’ve even issued public apologies for attacks that harm society, such as the Colonial Pipeline in 2021 that resulted in widespread fuel shortages.|
|Why spend time trying to hack into organizations when you can hire someone who has already done that work? Access brokers sell the access they’ve acquired from successful attacks to other cyber criminals.||Money launderers help the entire ransomware operations avoid law enforcement by “cleaning” the money, so it looks like it was acquired legally.|
By using this business model, ransomware groups can effectively leverage their areas of expertise to ensure a higher rate of success and, by extension, steal more money.
The rise of ransomware was closely followed by a rise in security technologies that are designed to prevent infections. But it takes a human touch to truly avoid becoming a victim.
IDENTIFY PHISHING ATTACKS DON’T ACCESS PIRATED CONTENT Phishing emails are one of the most common attack methods. Always carefully inspect messages for warning sings like a sense of urgency, threatening language, and poor grammar. Remember that even if an email appears to come from someone you know, it could still be a scam. Not only is it illegal to download pirated content (which means it has been stolen form the content creator), sites that offer illegal downloading services are often the target of criminal hackers. Downloading pirated content is an especially easy way to inject your computer with malware. AVOID REMOVABLE MEDIA MIND YOUR MOBILE DEVICES USB flash drives and charging cables offer an easy path towards infecting devices. Only use the charging cables that belong to you. Avoid public charging stations, such as those found at airports and cafes. If you find a random USB drive, DO NOT plug it in. Cyber criminals often develop mobile applications that can spread malware. You can avoid them by only visiting reputable online stores and researching the developers. USE ANTIVIRUS SOFTWARE Antivirus software is a security tool that can help identify and remove infections. In your personal life, consider installing an antivirus software on all your personal devices. Here at work, be sure to follow policy and never bypass any security controls.