1. How people respond to ransomware attacks
4/10/2023 11:30:36 AM
How people respond to ransomware attacks
Ransomware,Attacks,Cybersecurity,Decentralized,Naoris Protocol
https://news-cdn.moonbeam.co/How-people-respond-to-ransomware-attacks-App-Developer-Magazine_6f40nx29.jpg
App Developer Magazine
How people respond to ransomware attacks

Security

How people respond to ransomware attacks


Monday, April 10, 2023

David Carvalho David Carvalho

Naoris Protocol's survey revealed how people would respond to a ransomware attack as methods used by attackers are changing. Over 70% of respondents said they would not pay the ransom and 46% of respondents said they would not reveal that they were a victim for fear of suffering reputational damage.

Ransomware attackers extorted $456.8 million from victims in 2022, 40% down from the $765.6 million in the previous year. However, before we clink glasses to celebrate victory, there are some significant caveats to consider. The recent hack of Euler Finance where $135 million in staked Ether tokens (stETH), was drained from the protocol, is a case in point. How organizations react to these attacks differs vastly and the outcomes will most definitely shape regulation in this beleaguered asset class.

In a recent poll conducted by Naoris Protocol, a decentralized cybersecurity platform, it would appear that businesses are indeed doubling down on ransomware attackers by refusing to pay the price of clawing back stolen/encrypted data. The poll asked the question 'If you or your company were a victim of a ransomware attack, would you pay the attacker (including trying to negotiate a lower fee)?'

Interestingly the majority of respondents, 70.8%, said that they would not pay the ransom and would report the attack to the relevant authorities. This was surprising, as the findings do not correlate to other statistics on ransomware reporting. According to other reports, just 42% of companies who fall prey to a ransomware attack actually report it.

How people are responding to ransomware attacks

"It's much easier to take the moral high ground when the question is theoretical. When confronted with the reality of a ransomware attack that could cost your business millions per day, along with potential brand and reputational damage, businesses may be more reluctant to take a moral stance," said David Carvalho, CEO and co-founder of Naoris Protocol.

The next largest group in the poll, 16.55%, said they wouldn't pay the ransom nor report the attack but would rely on back-ups to restore data. Other research shows that out of all ransomware victims, 32% pay up, but they only get 65% of their data back, with only 57% of businesses successful in recovering data from backups. So this strategy does not work as an effective measure to retrieve data. To add insult to injury, more than a third of companies who paid a ransom to retrieve their data was targeted a second time and charged even more than the first attack, with 41% failing to recover all of their data.

Evolving attack methods

Evolving attack methods

While the number of successful ransomware attacks is down year on year, attack methods are evolving. Traditionally, attacks are carried out by encrypting target data and perpetrators charge victims a fee for the decryption key. Now criminals are resorting to  “double extortion” tactics, threatening to sell the data if the ransom isn't paid. They also use Denial of Service attacks and harassment via email or phone. While the number of ransomware payouts has dropped, the average ransomware amount is increasing. Unit 42, a cyber risk assessment company reported that the average ransom demanded in 2021 was approximately $2.2 million, a 144% increase from the average demand of $900,000 from cases analyzed in 2020.

Estimating the number of successful ransomware attacks (attacks that resulted either in data leaks or ransom payments) is challenging, as reporting is opaque and inconsistent. It's estimated that between May 2021 and June 2022, there have been 3,640 successful ransomware attacks globally.

Roughly 73% of organizations have suffered at least one ransomware attack in the past 24 months, and 60% of companies admitted that cybercriminals had worked inside their company for up to 6 months before the attack.

Other respondents in the Naoris Protocol poll, (5.32%) said they would pay the ransom but not report it, and 7.32% said they would pay and report it. Again, figures vary widely, according to a survey of 300 US-based IT decision-makers, 64% had been the victims of a ransomware attack in the last year, and 83% of victims paid the ransom.  
There are several top-class organizations doing analytics on cyber threats, and their reports have brought home the alarming extent and scale of cyber threats. However, it's important to note that the make-up of sample audiences can vary widely, potentially biassing some results. For example, surveying a group of enterprise CEOs vs an SME cohort would present material variances in how they approach cybercrime. 
Then there is the issue that no one wants to address, what happens to the data that gets stolen? Criminals will still have the files and could sell the information on the dark web with impunity. Ultimately, if the company that has been subjected to an attack gets its data back and manages to dodge a reputational bullet by not reporting it, its clients and networks will still pay the price of the breach, and worse still, they won't even know their data is in the hands of criminals.

Reputational damage from a cybersecurity breach

Reputational damage from a cybersecurity breach

While ethically wrong, it is understandable why companies don't want to reveal they have been a victim of an attack. A report by IBM and Forbes found that 46% of organizations that experienced a cybersecurity breach suffered significant reputational damage. A good example of this is Travelex, a foreign exchange company that collapsed into administration seven months after it suffered from a ransomware attack. It disrupted the company for more than a month and they eventually paid the attackers $2.3m. 
It's becoming increasingly clear that companies and institutions will not be able to hide a ransomware breach in the future. Regulators and Governments are suiting up against ransomware amid escalating attacks. It's a race against time, especially in the areas of critical infrastructure and government. Even though it was not a ransomware demand, the recent attack on NATO's Special Operations Headquarters and Strategic Airlift Capability, both working to deliver humanitarian aid to victims of the recent Turkish-Syrian earthquake, is a prime example of the skills of cyber criminals. In a more recent attack, The U.S. Marshals Service (USMS) reported the theft of sensitive law enforcement information, proof positive that even law enforcement is not beyond the scope of hackers.

Currently, there is legislation on the table making it illegal for companies to pay ransoms. A 2020 ruling by the U.S. The Department of Treasury's Office of Foreign Assets Control (OFAC) and the Financial Crimes Enforcement Network (FinCEN) states most cases of paying a ransom are illegal. The EU has followed suit, and EU member states can impose fines on paying ransoms under the Security of Network and Information Systems Directive (NIS Directive). Government proposals from leaders in Australia and appeals from Europol are also being tabled.

US President Joe Biden, recently laid down a new cybersecurity strategy, urging all industries to start taking their cybersecurity responsibilities more seriously. Up until now, reporting has been voluntary, with the government encouraging companies to report system intrusions and to regularly "patch" their programs to shut down newly discovered vulnerabilities. The voluntary stance has not delivered the desired results, so Biden's strategy recommends far broader mandates on private industry, as the vast majority of US digital infrastructure is controlled by this cohort. The US government is particularly concerned about attacks from abroad and the increasingly sophisticated technology that is being used to carry out attacks.

Decentralized Cybersecurity Mesh

Decentralized Cybersecurity Mesh

"Ultimately the best cure is prevention, and this starts with the education of employees and individuals on the role they can play in thwarting the attacks of cybercriminals. Emerging technology will also play a massive role in mitigating attacks. In an increasingly networked and decentralized world, every device with an internet connection is a potential point of failure or point of entry for a cyber attack. Traditional cybersecurity works on the premise that the access points are ring-fenced on their closed infrastructure network. However, in an increasingly decentralized and networked business environment, the distribution of devices and cloud servers pose a risk, as they become single points of failure regardless of current cybersecurity controls, e.g. employees' mobile phones, laptops, servers, etc. IT architectures are centralized, meaning there is a central point of control or authority. This makes it easy for attackers to target and compromise the entire system or take over processes. This heavily impacts resilience to threats and business continuity, even if threats are detected and risks are identified and known, it's usually too late to stop a major breach," said Carvalho.

Decentralized Cybersecurity Mesh is being recognized as an effective tool against cyber threats, in a decentralized cybersecurity environment, when a hacker interferes with code in a system or network through a device, there would be an instant alert and the device could potentially be locked out of the network, preventing the full network infrastructure from being compromised - bringing decentralized trust and security enforcement to centralized spaces. Web 2 cybersecurity is ineffective in mitigating Web 3 threats, while the technology gap is unresolved, businesses will continue to face cyber threat headwinds. In the meantime, given that 95% of all hackers are let in the front door by individuals clicking on Phishing links and the like, education would be a very worthwhile investment.


This content is made possible by a guest author, or sponsor; it is not written by and does not necessarily reflect the views of App Developer Magazine's editorial staff.

Subscribe to App Developer Magazine

Become a subscriber of App Developer Magazine for just $5.99 a month and take advantage of all these perks.

MEMBERS GET ACCESS TO

  • - Exclusive content from leaders in the industry
  • - Q&A articles from industry leaders
  • - Tips and tricks from the most successful developers weekly
  • - Monthly issues, including all 90+ back-issues since 2012
  • - Event discounts and early-bird signups
  • - Gain insight from top achievers in the app store
  • - Learn what tools to use, what SDK's to use, and more

    Subscribe here