Ransomware is not a 'malware problem' - it's a criminal business model
Article by Ryan Olson, Unit 42 Analysts, Palo Alto Networks Today, Unit 42 published our latest paper on ransomware, which has quickly become one of the greatest cyberthreats facing organisations around the world. As a business model, ransomware has proven to be highly effective in generating revenue for cybercriminals in addition to causing significant operational impact to affected organisations. It is largely victim agnostic, spanning the globe and affecting all major industry verticals. Small organisations, large enterprises, individual home users – all are potential targets.
Ransomware has existed in various forms for decades; but, in the last three years, criminals have perfected the key components of these attacks. This has led to an explosion of new malware families, which make the technique work, and drawn new actors into participating in these lucrative schemes.
To execute a successful ransomware attack, an adversary must be able to do the following:
- Take control of a system or device.
- Prevent the owner of the controlled device from accessing it, either partially or completely.
- Alert the owner that the device has been held for ransom, indicating the method and amount to be paid.
- Accept payment from the device owner.
- Return full access to the device owner after payment has been received.
If the attacker fails in any of these steps, the scheme will be unsuccessful. While the concept of ransomware has existed for decades, the technology and techniques required to complete all five of these steps at a wide scale were not available until just a few years ago. The resulting wave of attacks using this scheme has impacted organisations all over the world, many of whom were not prepared to prevent these attacks from being successful.
The paper we released details the history of ransomware and how attackers have spent many years trying to get this business model right. We also delve into what we can expect from future ransomware attacks, which includes the trends that follow.
1. More Platforms
Ransomware has already moved from Windows to Android devices and, in one case, targeted Mac OS X. No system is immune to attack, and any device that an attacker can hold for ransom will be a target in the future.
This concept will become even more applicable with the growth of the “Internet of Things” (IoT). While an attacker may be able to compromise an Internet-connected refrigerator, it would be challenging to turn that infection into a revenue stream. But the ransomware business model can be applied in this or any other case where the attacker can achieve all five steps for a successful ransomware attack. After infecting the refrigerator, the attacker could remotely disable the cooling system and only re-enable it after the victim has made a small payment.
2. Higher Ransoms
The majority of single-system ransomware attacks charge a ransom between US$200 and US$500, but the values can be much higher. If attackers are able to determine that they have compromised a system which stores valuable information, and that infected organisation has a higher ability to pay, they will increase their ransoms accordingly. We have already seen this in a number of high-profile ransomware attacks against hospitals in 2016, where the ransoms paid were well over US$10,000.
3. Targeted Ransom Attacks
A targeted intrusion into a network is valuable to an attacker in many ways. Selling or acting on stolen information is a common technique, but it often requires additional “back-end” infrastructure and planning to turn that information into cash. Targeted ransomware attacks are an alternative for attackers who may not know how else to monetize their intrusion. Once inside a network, attackers can identify high-value files, databases, and backup systems and then encrypt all of the data at one time. These attacks, using the SamSa malware, have already been identified in the wild and proven lucrative for the adversaries conducting them.
About Palo Alto Networks
Palo Alto Networks is the next-generation security company, leading a new era in cybersecurity by safely enabling applications and preventing cyber breaches for tens of thousands of organisations worldwide. Built with an innovative approach and highly differentiated cyberthreat prevention capabilities, our game-changing security platform delivers security far superior to legacy or point products, safely enables daily business operations, and protects an organization's most valuable assets. Find out more at www.paloaltonetworks.com. Article by Ryan Olson, Unit 42 Analysts, Palo Alto Networks