Five facts to know about ransomware attacks

Hackers will offer the victim a key in return for cryptocurrency payments that can run into millions of dollars


Reuters June 02, 2021
The company believes the hacker to be a "state-sponsored actor". PHOTO: REUTERS

A ransomware attack on Brazil’s JBS SA, the world’s largest meatpacker, has brought attention to the growing area of cybercrime.

The following are some details on ransomware and the issues around it:

What is ransomware?

- Ransom software works by encrypting victims’ data; typically hackers will offer the victim a key in return for cryptocurrency payments that can run into the hundreds of thousands or even millions of dollars. If the victim resists, hackers are increasingly threatening to leak confidential data in a bid to pile on the pressure.

The ransomware group DarkSide, suspected by US authorities of the Colonial Pipeline attack last month, said it wanted to make money. Colonial Pipeline’s CEO said his company paid a $4.4 million ransom as executives were unsure how badly its systems were breached or how long it would take to restore the pipeline.

How widespread is it?

- Ransomware gangs collected almost $350 million last year, up threefold from 2019, according to members of a public-private group called the Ransomware Task Force. While the magnitude of the DarkSide breach was significant, other kinds of attacks have arguably been more destructive.

In 2017 the so-called WannaCry cyber attack crippled hospitals, banks, and other companies across the globe. The US government here said the attack cost billions and blamed North Korea.

Instagram removes hundreds of accounts tied to username hacking

NotPetya malware, which struck Ukraine the same year but also did damage worldwide, similarly racked up billions in costs.

Who is behind the attacks?

- A number of gangs, many of them Russian speakers, develop the software that encrypts files, demanding payment in cryptocurrency for keys that allow the owners to decipher and use them again. An increasing number of the gangs and affiliates who break into the targets now demand additional money not to publish sensitive documents on the internet.

The surge in payments extracted and the strategic nature of the targets has raised new questions about the failure of officials in Russia and other countries to crack down on the gangs.

What is being done to stop it?

- In April the US Department of Justice established a government group on ransomware. Central bank regulators and financial crime investigators worldwide are also debating if and how cryptocurrencies, which are used to pay the ransoms, should be regulated.

US cybersecurity firm FireEye discloses breach, theft of hacking tools

What was the last major attack on US infrastructure?

- Last month Colonial Pipeline week fell victim to a cyberattack that shut its entire network. The ransomware attack was one of the most disruptive digital ransom schemes reported and the resulting shutdown disrupted fuel supply across the eastern United States.

Before that, in October 2020 Eastern European criminals targeted dozens of US hospitals with ransomware, including in Oregon, California, and New York. The FBI and Homeland Security officials subsequently led a conference for hospital administrators and cybersecurity experts.

What can be done to stop ransomware?

- Criminals using ransomware to extort money do not always use the most sophisticated methods. Biden administration official Anne Neuberger said, for example, that the DarkSide ransomware used in the Colonial attack was a “known variant” and said some breaches can be thwarted by making sure computer networks have installed up-to-date patches.

COMMENTS

Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ