Welcome!

Cloud Security Authors: Elizabeth White, Zakia Bouachraoui, Pat Romanski, Yeshim Deniz, Liz McMillan

Related Topics: @CloudExpo, Cloud Security

@CloudExpo: Article

Ransomware Evolution | @CloudExpo #InfoSec #DataCenter #Security

What You Should Know About Ransomware Evolution

Initially, we came across ransomware which exploited the entire system and just restricted you from interacting with your own device, later on requiring you to pay dollars if you want to go back and use your computer.

And then it started becoming obsolete because an end-user. People were asking themselves: “That is my computer, would I pay $100 for it? If I don't really have data, I’d better format my PC and start all over again.” So, that strategy – locking access to computers, started becoming obsolete.  What did the bad guys do?  They realized that the previous strategy was only good when the data that computer was holding was valuable. So they started asking ransom for the data, and that's what they're doing now.

That was the evolution. It's the same thing with the same bad people doing that, evolving over time, and then we get a situation now where the bad guys are looking at the valuable part of the computer, which is the data. And now criminals are going after the computer data. They encrypt the information. They don’t pay attention when you are reaching out to some software tools on your PC. What is important now is that you won’t have the ability to open your files. Now if you need those files, if they are important to you, send money first.

Soб it's been evolving over time. The moment when someone reinvented the whole ransomware strategy and being successful with it, then everybody else in that same black hat industry started to do the same. It moved on progressively from one to the other cyber-criminal.

Encryption is an old tool, It's just putting data into a strong box and protecting it. I get your data, your personal stuff, in my strong box and say: "Hey, I won't give you the combination, just give me the money."  Is that a bad use of a safety locker?  It probably is. Does it mean that the technology is not doing its work? No, it's doing perfectly what it's supposed to be doing. It's a misuse. It's just that the bad guy is using it his way.

If you think that this is bad for the end-user, it's much worse for the corporation because at the end of the day, corporations host a lot of very important data. Private users have family pictures on their hard disk. If they lose them, they would be pained. Five years’ worth of pictures are gone, but ordinary people are not going to pay $3,000 to get those pictures back. But in a corporation, imagine salary data, financial data кthat is completely vital. Corporations need that data. In worse case scenario, if they have no backups, they have no other recourse other than paying. They will pay any sum because it's vital for the continued survival of the company. Much more is involved in a corporate scenario than in a home scenario.

At the end of the day, ransomware is not a very technically complex kind of malware. It's more of a concern because criminals are misusing a technology that is completely normal. We do have a lot of good things going. We have traditional detection. Traditional detection is a baseline. Then we can detect anything that looks vaguely like one of previous ransomware variants, even if it's vague, we can stop it and say: "This looks suspicious, stop that right there." And, more importantly, we have web reputation services, which means that any bad link that we already know of, because it's hosted on a bad IP.

What I might suggest for every person is to maintain a strong backup master plan and strategy. You should address ransomware as any other data corruption. Just as for any possible data loss, you should have a decent backup strategy available. Should you fail to have one, then you are susceptible to data loss. What if tomorrow your light goes off and your hard disk fails? What happens? Are you going to ask for any sort of compensation from the hard disk manufacturer or from the electric company? Maybe you would, but you are still screwed because you don't have your data.

More Stories By David Balaban

David Balaban is a computer security researcher with over 10 years of experience in malware analysis and antivirus software evaluation. David runs the Privacy-PC.com project which presents expert opinions on the contemporary information security matters, including social engineering, penetration testing, threat intelligence, online privacy and white hat hacking. As part of his work at Privacy-PC, Mr. Balaban has interviewed such security celebrities as Dave Kennedy, Jay Jacobs and Robert David Steele to get firsthand perspectives on hot InfoSec issues. David has a strong malware troubleshooting background, with the recent focus on ransomware countermeasures.

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments t...
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and...
Bill Schmarzo, Tech Chair of "Big Data | Analytics" of upcoming CloudEXPO | DXWorldEXPO New York (November 12-13, 2018, New York City) today announced the outline and schedule of the track. "The track has been designed in experience/degree order," said Schmarzo. "So, that folks who attend the entire track can leave the conference with some of the skills necessary to get their work done when they get back to their offices. It actually ties back to some work that I'm doing at the University of San...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...
Bill Schmarzo, author of "Big Data: Understanding How Data Powers Big Business" and "Big Data MBA: Driving Business Strategies with Data Science," is responsible for setting the strategy and defining the Big Data service offerings and capabilities for EMC Global Services Big Data Practice. As the CTO for the Big Data Practice, he is responsible for working with organizations to help them identify where and how to start their big data journeys. He's written several white papers, is an avid blogge...