Every day I hear that a company has solved the network and file security war with a new security widget. Yet every day there are more announcements of breaches, stolen identities, etc. According to the Identity Theft Resource Center (ITRC) in 2015 there were 781 data breaches in the U.S. As of July 12, 2016 ITRC report there were 522 U.S. breaches with 12,983,562 exposed records, which looks to surpass 2015.
What are the source of these breaches?
In 2016 the major threat is Ransomware, which attributes to a 20% increase in reported attacks.
Trend Micro’s definition of Ransomware is simple:
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.
Ransomware is a billion dollar worldwide threat. The first viable Ransomware, Cryptowall, cost people over $325M in 2015. For the the first quarter of 2016 the costs are running over $209M which was given by CNBC and the FBI in April. The Q1 2016 number is alarming and could possibly reach the 1-2 Billion dollar level in 2016.
Although there are hundreds of variations of Ransomware, with new variants emerging daily, there are five signatures that define that your malware fits into the Ransomware family.
The four $ignatures of Ransomware Attacks
Ransomware is evolving at a rapid pace. In the beginning, it only attacked through computer browsers. It has evolved and is now attacking all operating systems (yes, Apple too) as well as mobile devices including android, iPhones and tablets.
Thanks to BleepingComputer.com we know that in July 2016 we have seen many new and dangerous variants.
Below is a list of the variants, for additional details, including fixes visit our friends at Bleeping Computer.
Everyday there are more attacks and variants found. Most costing the victim between $300 to several thousands dollars to decrypt. The alarming news is sometimes you pay and your data cannot be decrypted.
According to the FBI’s Cyber Division Assistant Director James Trainor, Ransomware attacks are on the rise in 2016 and will continue to grow. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.”
So far in 2016 we have seen a number of new and much more sophisticated ransomware versions. Overall attacks up about 50%.
One has to remember that Ransomware is not just encrypting your data and getting you to pay to get it back. It is also a data thief method and in most cases it permanently corrupts your system allowing the hackers an easy permanent backdoor to your systems.
Some ransomware will do all three of these in one operation.
Encryption or Crypto-Ransomware
Lock Screen or WinLocker Ransomware
Master Boot Record Ransomware (MBR)
New ransomware is constantly changing, and will actually play a game with you, meet Jigsaw:
The serial file killer, “Jigsaw” targets over 120 file extension types to encrypt and sets a timer for payment. Jigsaw than starts deleting the encrypted files every hour that the victim does not pay. At some point, usually 72 hours, it deletes all files that were encrypted. There is a fix if you act quickly.
ALWAYS backup your data at regular intervals on separate devices. Cloud backups are very vulnerable to attacks. A separate isolated device is best, like a hard drive backup.
Even the with the best defenses and common sense in place, you could still become a victim of ransomware. The FBI's official policy is to not pay. However, we've individuals and the business sector give into demands. Healthcare in particular has been hard hit with ransomware attacks.
Here's the problem with paying in response to a ransomware attack:
“Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.” said James C. Trainor, Jr. FBI Assistant Director.
If the inline security tool goes off-line, the TAP will bypass the tool and automatically keep the link flowing. The Bypass TAP does this by sending heartbeat packets to the inline security tool. As long as the inline security tool is on-line, the heartbeat packets will be returned to the TAP, and the link traffic will continue to flow through the inline security tool.
If the heartbeat packets are not returned to the TAP (indicating that the inline security tool has gone off-line), the TAP will automatically 'bypass' the inline security tool and keep the link traffic flowing. The TAP also removes the heartbeat packets before sending the network traffic back onto the critical link.
While the TAP is in bypass mode, it continues to send heartbeat packets out to the inline security tool so that once the tool is back on-line, it will begin returning the heartbeat packets back to the TAP indicating that the tool is ready to go back to work. The TAP will then direct the network traffic back through the inline security tool along with the heartbeat packets placing the tool back inline.
Some of you may have noticed a flaw in the logic behind this solution! You say, “What if the TAP should fail because it is also in-line? Then the link will also fail!” The TAP would now be considered a point of failure. That is a good catch – but in our blog on Bypass vs. Failsafe, I explained that if a TAP were to fail or lose power, it must provide failsafe protection to the link it is attached to. So our network TAP will go into Failsafe mode keeping the link flowing.
Single point of failure: a risk to an IT network if one part of the system brings down a larger part of the entire system.
Heartbeat packet: a soft detection technology that monitors the health of inline appliances. Read the heartbeat packet blog here.
Critical link: the connection between two or more network devices or appliances that if the connection fails then the network is disrupted.