Industrial Cybersecurity Pulse
  • SUBSCRIBE
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
SUBSCRIBE
  • Resources
  • Helpful Links
  • Editorial Calendar
  • Advertise
  • Contribute
Industrial Cybersecurity Pulse
Subscribe
Industrial Cybersecurity Pulse
  • Threats & Vulnerabilities
  • Strategies
  • IIoT & Cloud
  • Education
  • Networks
  • IT/OT
  • Facilities
  • Regulations
  • Threats & Vulnerabilities

IST’s Ransomware Task Force seeks to remedy ransomware attacks

  • Tyler Wall
  • June 6, 2022
Courtesy: CFE Media
Courtesy: CFE Media
Total
0
Shares
0
0
0
0

As society has progressed into a more technological era, an increase in cyberattacks has logically followed suit. Any technology connected to the internet — or even capable of a Bluetooth connection — is susceptible to threat actors. Hackers are requiring less and less experience to work their way into secure and unsecure networks and devices.

One of the major threats on the rise is ransomware — an attack where a person holds encrypted data for ransom. The only way for the victims to get their data back is to pay the ransom.

But there is a catch: Paying the ransom doesn’t guarantee stolen data will be returned at all. And even if it is returned, it may be corrupted or otherwise damaged.

In response, the Institute for Security and Technology (IST) has created the Ransomware Task Force to put together a plan of action to disrupt ransomware attacks across the industry.

The first ransomware attack

The industry most targeted by ransomware is health care, which hackers began exploiting in 1989.

The first ransomware attack was carried out by AIDS researcher Joseph Popp, who sent out 20,000 floppy disks to various researchers across the world, claiming there was a questionnaire to help analyze the potential AIDS risk of a given person. However, those floppy disks contained a strain of malware that would be activated after the computer was powered on 90 times. It demanded $189 ($440 in 2022) and another $378 ($881 in 2022) to continue using the questionnaire. Altogether, this adds up to a potential $3.7 million minimum to unlock the software, a staggering $8.6 million today. Because this was before the current digital age, Popp had the money sent offshore to Panama to make it safe and “untraceable” (or so he thought).

Soon after initiating the attack, Popp was arrested by the FBI and faced 10 counts of blackmail and damages. He never suffered any real consequences because his lawyers made it seem like he was stealing from the rich to give back to the poor, but it is believed that he was angered because he didn’t get a job at the World Health Organization (WHO).

This malware would be labeled the AIDS Trojan, and it is considered the first ransomware attack in history.

The harsh and growing reality of ransomware 

According to Cloud Wards — a cybersecurity and cloud website devoted to sharing expert opinions and tech solutions — about 32% of ransomware victims pay. However, even after they do pay, they only get 65% of their data back. Only 8% of businesses who pay a ransom get all of their data returned.

And it only gets worse.

Again, from Cloud Wards: “In 2021, the average ransom demand reached $220,298 — up 43% compared to 2020.” Interestingly, the number of ransomware attacks has actually gone down, but the efficacy of each attack continues to go up, making them as much of a threat as ever.

Those who deploy ransomware usually only accept cryptocurrency as payment for returning the data. This is because cryptocurrency payments provide anonymity and a level of protection against tracking the threat actor. Generally, Bitcoin is the cryptocurrency of choice because of its availability and accessibility, but another coin called Monero is much preferred because it is untraceable. However, the lack of availability and accessibility make Monero a more complicated option.

Recently, ransomware has started to take another turn, with “cyber gangs” selling ransomware-as-a-service (RaaS) to third parties. The providers, on average, take a 20% cut of the profits, while the third party takes the other 80%. This method, which gives almost anybody the ability to use ransomware, is lowering the barrier to entry for a potential attacker to commandeer a business’ or person’s data. The price to get this service? As little as $50 on the dark web.

There seems to be no answer for the darkness of ransomware attacks.

The Ransomware Task Force 

In a time when everyone is looking for answers to the ransomware epidemic, IST’s Ransomware Task Force has released a report on how people can combat ransomware in 2022.

The Ransomware Task Force is a conglomerate of industry experts across the U.S., from software companies to government agencies, that are tackling the issue of ransomware head-on.

IST CEO and Ransomware Task Force Executive Director Philip Reiner said, “We felt an urgent need to bring together world-class experts across all relevant sectors to create a ransomware framework that government and industry can pursue, and ensure the continued faith of the general public in its institutions.”

Their report gives four primary goals:

  1. Make ransomware an international priority. This includes making sure ransomware is a known issue on an international stage and working to reduce the places where threat actors can “operate with impunity.”
  2. Interfere in ransomware activity. While this may seem obvious, it isn’t simple. This can be done by disrupting payment facilities, targeting the infrastructure threat actors use and interfering with in-process ransom initiatives.
  3. Aid businesses in ransomware attack preparation. This boils down to spreading awareness of ransomware to different businesses so they can institute protocols in the event of an attack, as well as encouraging a cybersecurity insurance policy and updating all systems to the most current software/firmware.
  4. Increase ransomware response efficacy. This includes sharing stories of ransomware and increasing the amount of high-quality information about ransomware to businesses, as well as informing businesses about alternatives to paying a ransom (it may be cheaper to recover data yourself than paying a ransom).

Will we learn fast enough? 

Ransomware is an issue that isn’t going away anytime soon, and cyber-vigilance is a crucial part of defending against it. Cyber insurance companies are starting to incorporate ransomware policies to aid in attack mitigation, and knowledge surrounding ransomware is ever-increasing, which allows defenders to learn from past attacks.

However, the question of whether we can learn fast enough continues to linger as more and more businesses pay out for data they won’t ever get back.

Do you have experience and expertise with the topics mentioned in this article? You should consider contributing content to our CFE Media editorial team and getting the recognition you and your company deserve. Click here to start this process.

Tyler Wall

Tyler Wall is an Associate Editor at CFE Media and Technology.

Related Topics
  • CFE Content
  • Featured
  • news
Previous Article
A hacker in the background.
  • Threats & Vulnerabilities

Throwback Attack: MiniDuke malware attacks 23 countries

  • Christina Miller
  • June 3, 2022
Read More
Next Article
  • Strategies

New approach allows for faster ransomware detection

  • Matt Shipman
  • June 7, 2022
Read More
You May Also Like
Courtesy: Brett Sayles
Read More

Managing external connections to your operational technology (OT) environment

SwRI used programmable logic controllers (PLCs) connected to input/output (I/O) modules to a test network. Algorithms scanned the network for cyberattacks through data packets transferred over the Modbus/TCP protocol. Courtesy: Southwest Research Institute (SwRI)
Read More

IDS developed for industrial control systems

Six key constituents can drive targeted solutions to the ICS environment: 1. Audit and application of security policies and procedures; 2. Access controls with secure data transfers; 3. Threat detection of abnormal and malicious activity at all levels of the ICS infrastructure; 4. Risk management and mitigation; 5. Process sensors security and authentication; and 6. Resolution of key security problems that requires intrinsic relationship with vendors. Courtesy: MG Strategy+, Control Engineering
Read More

Six critical components of integrated cybersecurity for industrial control systems (ICS)

Figure 1: To determine effectiveness and maturity, take a particular control and plot the effectiveness score on the Y-axis of a graph and the DMS on the X-axis of the graph. By seeing which quadrant the result falls into, people can quickly make some general statements about the systems under consideration. Courtesy: Maverick Technologies
Read More

Securing the ICS: Measure solution effectiveness, maturity

elliTek's IIoTA MES Gateway Appliance. Courtesy: elliTek
Read More

Cybersecurity and IT/OT convergence: How important is your data?

Courtesy: Brett Sayles
Read More

NERC CIP checklist for identification and categorization of BES cyber assets

Read More

How serial-to-Ethernet converters help attackers breach cyber-physical assets

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.
Read More

An overlooked ICS cybersecurity gap for companies

SUBSCRIBE

GET ON THE BEAT

Keep your finger on the pulse of top industry news

SUBSCRIBE TODAY!
VULNERABILITY PULSE
  • Mitsubishi Electric - June 14, 2022
  • Meridian Cooperative - June 14, 2022
  • Johnson Controls - June 14, 2022
  • Microsoft - June 14, 2022
  • Citrix - June 14, 2022

RECENT NEWS

  • Protecting the power grid through cyber-physical threat response
  • How to secure Industry 4.0 in a highly connected world
  • Managing external connections to your operational technology (OT) environment
  • Webcast: Addressing Cybersecurity Challenges in Industry 4.0
  • How a desert water utility helped protect critical infrastructure

EDUCATION BEAT

Introduction to Cybersecurity within Cyber-Physical Systems

Cyber-physical systems serve as the foundation and the invention base of the modern society making them critical to both government and business.

REGISTER NOW!
HACKS & ATTACKS
  • Ron Brash Interview: Expert advice on finding the root of the ransomware problem
  • Throwback Attack: How the modest Bowman Avenue Dam became the target of Iranian hackers
  • Minimizing the REvil impact delivered via Kaseya servers
  • Key takeaways from 2020 ICS-CERT vulnerabilities
Industrial Cybersecurity Pulse

Copyright 2022 CFE Media and Technology.
All rights reserved.


BETA

Version 1.0

  • Content Partners
  • Contact Us
  • Privacy Policy
  • Terms and Conditions

Input your search keywords and press Enter.

By using this website, you agree to our use of cookies. This may include personalization of content and ads, and traffic analytics. Review our Privacy Policy for more information. ACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT