{"id":16151,"date":"2019-08-23T08:10:03","date_gmt":"2019-08-23T16:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/08\/23\/news-9894\/"},"modified":"2019-08-23T08:10:03","modified_gmt":"2019-08-23T16:10:03","slug":"news-9894","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/23\/news-9894\/","title":{"rendered":"Ransomware continues assault against cities and businesses"},"content":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 23 Aug 2019 15:00:50 +0000<\/strong><\/p>\n<p>Ransomware continues to make waves in the US, forcing multiple cities and organizations into tough choices. Pressed for cash and time, local government organizations are <a href=\"https:\/\/www.nytimes.com\/2019\/08\/22\/us\/ransomware-attacks-hacking.html\" target=\"_blank\" rel=\"noopener noreferrer\">left with few options<\/a>: Either pay the<span class=\"Apple-converted-space\">\u00a0<\/span>ransom as soon as possible and encourage criminals to continue bringing essential services to their knees, or refuse and be left with a <a href=\"https:\/\/www.wired.com\/story\/atlanta-spent-26m-recover-from-ransomware-scare\/\" target=\"_blank\" rel=\"noopener noreferrer\">massive cleanup bill<\/a>.<\/p>\n<p>When a $50,000 ransom becomes millions of dollars in cleanup, forensics, external tech assistance, and more, sadly more and more organizations are throwing up their hands and paying the ransom.<\/p>\n<p>Doing so almost certainly encourages the same or similar threat actor groups to come back around again at a later date, applying claims for their daily dose of extortion racket money. So what should these cities do?<\/p>\n<p>We take a look at the most recent attacks, how US and international cities have handled them, and our advice for dealing with the aftermath.<\/p>\n<h3>A cone of silence: Texas<\/h3>\n<p>Twenty-three (23) local government organizations in Texas were recently <a href=\"https:\/\/www.wired.com\/story\/ransomware-strike-local-texas-government-agencies\/\" target=\"_blank\" rel=\"noopener noreferrer\">hit by a coordinated attack<\/a> likely from a single threat actor. Unlike some previous assaults on city infrastructure where information was released quickly, here officials are keeping their cards close to their chest. No word yet as to which networks, devices, or other technological infrastructure were affected, which family of ransomware was behind the attack, how defenses were penetrated, or if a ransom was paid.<\/p>\n<p>According to WIRED, response teams from \u201cTDIR, the Texas Division of Emergency Management, Texas Military Department, Department of Public Safety, and the Texas A&amp;M University System&#8217;s Security Operations Center\/Critical Incident Response Team SOC\/CIRT\u201d are all working to bring systems back online. This may suggest they held out on paying the ransom, and either the scam pages were taken down (meaning no ransom could be paid), or they missed a deadline and all systems were permanently locked out.<\/p>\n<p>Either way, it could be that Texas is trying a new tactic: regardless of outcome, prevent the endgame of the attack from gaining oxygen. Simply hearing that someone paid or held off and had their network crushed makes it a lot easier for future potential attackers to figure out what worked, what didn\u2019t, who paid up, and who is more likely to give nothing in return.<\/p>\n<p>While it\u2019s unlikely we won\u2019t hear more and at least find out which files were used in the attack, it will be interesting to see if this tactic pays off for at-risk organizations or simply digs them a deeper hole.<\/p>\n<h3>Paying up: Florida<\/h3>\n<p>Florida has been hit particularly hard by ransomware attacks, and in just one month no less than <a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/06\/is-there-something-in-the-water-third-florida-city-hit-by-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">three Florida municipal governments<\/a> have been dumped on by the triple threat of <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/03\/emotet-revisited-this-pervasive-persistent-threat-is-still-a-danger-to-businesses\/\" target=\"_blank\" rel=\"noopener noreferrer\">Emotet<\/a>, <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/trickbot-takes-top-business-threat\/\" target=\"_blank\" rel=\"noopener noreferrer\">TrickBot<\/a>, and <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ryuk ransomware<\/a>. Sadly, all three cases were triggered by the age-old trick of a booby-trapped attachment sent via email. Lake City was for all intents and purposes knocked out of digital commission, having to revert to pen and paper in place of locked-out computer systems. Emergency services remained untouched, but everywhere else\u2014from email and land lines to credit card payments and city departments\u2014chaos reigned.<\/p>\n<p>Eventually, they ended up paying some US$460,000 in Bitcoin to the ransomware authors to release compromised systems. Riviera Beach, struck by a similar attack, <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-48770128\" target=\"_blank\" rel=\"noopener noreferrer\">ended up paying a cool US$600,000<\/a> to fix their hijack. These are incredible amounts of money to send to attackers who may simply have lucked out getting their infection files on the networks of big fish targets, but a drop in the ocean compared to the clean up costs\u2014and that\u2019s why cybercriminals keep getting away with it.<\/p>\n<p>Some of these payments <a href=\"https:\/\/slate.com\/technology\/2019\/06\/ransomware-insurance-companies-riviera-beach.html\" target=\"_blank\" rel=\"noopener noreferrer\">are covered by insurers<\/a>, with many offering ransom protection as part of their services. As many have noted, paying the ransom is bad enough in that it essentially encourages attackers to keep going. Turning payments into an accepted cost of doing business removes much of the threat from organizations and probably means many simply won\u2019t bother to spend on upgrading their network protection. After all, if the insurance companies are going to pay, then why bother?<\/p>\n<p>However, complacency from organizations will only result in bigger and bigger fines from emboldened cybercriminals, who will most certainly capitalize on the opportunity to squeeze more money out of cities and companies. Eventually, insurance companies will drop organizations or require excessive monthly payments if the attacks keep happening.<\/p>\n<p>Anthony Dagostino, global head of cyber risk at Willis Towers Watson, <a href=\"https:\/\/www.insurancejournal.com\/news\/national\/2017\/12\/21\/475083.htm\" target=\"_blank\" rel=\"noopener noreferrer\">told Insurance Journal<\/a> magazine, &#8220;We\u2019re already getting word that some insurance companies are not providing the coverage or are adding to the deductibles.&#8221;<\/p>\n<h3>A state of emergency: Louisiana<\/h3>\n<p>Regardless of who pays and who doesn\u2019t, make no mistake: People are taking these attacks seriously. We\u2019re at the point where governors are declaring a state of emergency when these assaults on crucial infrastructure take place. After attacks on <a href=\"https:\/\/blog.malwarebytes.com\/trojans\/2019\/08\/trojans-ransomware-dominate-2018-2019-education-threat-landscape\/\" target=\"_blank\" rel=\"noopener noreferrer\">multiple school districts<\/a>, Louisiana Governor John Bel Edwards <a href=\"https:\/\/arstechnica.com\/tech-policy\/2019\/07\/louisiana-declares-state-emergency-in-response-to-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">called it in<\/a>. Prior to that, Colorado gained some level of cybersecurity fame by issuing the the first-ever state of emergency executive order for a computer-centric attack.<\/p>\n<h3>A global threat: Johannesburg<\/h3>\n<p>The US may be grappling with the lion\u2019s share of ransomware attacks, but let\u2019s not forget this is a truly worldwide problem. In July, Johannesburg in South Africa found itself unable to respond to power failures after a <a href=\"https:\/\/www.bbc.co.uk\/news\/technology-49125853\" target=\"_blank\" rel=\"noopener noreferrer\">successful ransomware attack<\/a>. It potentially affected up to a quarter million people, preventing customers from buying electricity, causing issues with electrical supplies, and even stopping energy firms from dealing with localized blackouts.<\/p>\n<h3>Businesses under ransomware threat<\/h3>\n<p>Unlike the hugely-popular band Radiohead, who can choose to give away their <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/06\/radioheads-ransom-response-shows-novel-approach-for-ransomware-victims\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomed music<\/a> instead of succumbing to extortion attempts, organizations faced with a ransomware attack have no similar alternative. Pay up, or deal with the mess left behind is all that\u2019s available. And as attacks ramp up, if they don&#8217;t look at <a href=\"https:\/\/blog.malwarebytes.com\/101\/2016\/04\/how-to-protect-your-business-from-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">preventative action<\/a>, they may be forced to make a call between bad and worse.<\/p>\n<p>As our <a href=\"https:\/\/blog.malwarebytes.com\/reports\/2019\/08\/labs-quarterly-report-finds-ransomwares-gone-rampant-against-businesses\/\" target=\"_blank\" rel=\"noopener noreferrer\">most recent quarterly report<\/a> highlights,<\/p>\n<blockquote>\n<p><em>Over the last year, we\u2019ve witnessed an almost constant increase in business detections of ransomware, rising a shocking 365 percent from Q2 2018 to Q2 2019.<\/em><\/p>\n<\/blockquote>\n<p>That\u2019s quite a bump. Some other key findings:<\/p>\n<ul>\n<li>Ransomware families such as Ryuk and RobinHood are mostly to blame for targeted attacks, though <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2018\/05\/samsam-ransomware-need-know\/\" target=\"_blank\" rel=\"noopener noreferrer\">SamSam<\/a> and Dharma also made appearances.<span class=\"Apple-converted-space\">\u00a0<\/span><\/li>\n<li>The ransomware families causing the most trouble for businesses this quarter were Ryuk and Phobos, which increased by an astonishing 88 percent and 940 percent over Q1 2019, respectively. GandCrab and Rapid business detections both increased year over year, with Rapid gaining on Q2 2018 by 319 percent.<\/li>\n<li>Where leading ransomware countries are concerned, the United States took home the gold with 53 percent of all\u00a0detections from June 2018 through June 2019. Canada came in a distant second with 10 percent,\u00a0and the United Kingdom and Brazil followed closely behind, at 9 percent and 7 percent,\u00a0respectively.<\/li>\n<li>Texas, California, and New York were the top three states infected with ransomware, ganged\u00a0up on with a combination of GandCrab, Ryuk, and Rapid, which made up more than half of the detections in these states. Interestingly, the states with the most ransomware detections were not always the most populous. North Carolina and Georgia rounded out our top five ransomware states, but they are not as heavily-populated as Florida or Pennsylvania, neither of which made our list.<\/li>\n<\/ul>\n<h3>Where to go from here<\/h3>\n<p>The pressure is most definitely on. Businesses and local governments must ensure they not only have a recovery plan for ransomware attacks, but a <a href=\"https:\/\/www.malwarebytes.com\/business\/endpointprotectionandresponse\/\" target=\"_blank\" rel=\"noopener noreferrer\">solid line of layered defense<\/a>, complete with a smattering of <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/create-sticky-cybersecurity-training-program\/\" target=\"_blank\" rel=\"noopener noreferrer\">employee training<\/a> in the bargain. When so many attacks begin with a simple email attachment, it\u2019s frustrating to think how many major incidents could\u2019ve been avoided by showing employees <a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noopener noreferrer\">how to recognize phishing attempts<\/a> or other <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/06\/five-easy-ways-to-recognize-and-dispose-of-malicious-emails\/\" target=\"_blank\" rel=\"noopener noreferrer\">malicious emails<\/a>.<\/p>\n<p>Of course, securing the line of defense and taking preventative action is just one part. The growing willingness to pay the ransom and on some fundamental level encourage threat actors to do it all over again is not helping. However, with the ever-present threat of budget cuts and a lack of funding\/security resources in general, it\u2019s difficult to pass judgment.<\/p>\n<p>More and more government officials will need to <a href=\"https:\/\/blog.malwarebytes.com\/business-2\/2019\/08\/making-the-case-how-to-get-board-to-invest-in-government-cybersecurity\/\" target=\"_blank\" rel=\"noopener noreferrer\">make their case to the board<\/a> on why cybersecurity is an important business investment. And the board will need to listen. Otherwise, ransomware authors will continue to dine like kings.<span class=\"Apple-converted-space\">\u00a0<\/span><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/\">Ransomware continues assault against cities and businesses<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Christopher Boyd| Date: Fri, 23 Aug 2019 15:00:50 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/' title='Ransomware continues assault against cities and businesses'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/08\/shutterstock_404668465.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>We take a look at the current chaos faced by local governments across the US, as ransomware continues to snap at its cities&#8217; heels.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/ransomware\/\" rel=\"category tag\">Ransomware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/attack\/\" rel=\"tag\">attack<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/backup\/\" rel=\"tag\">backup<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/critical-infrastructure\/\" rel=\"tag\">critical infrastructure<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/florida\/\" rel=\"tag\">Florida<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/local-government-organisation\/\" rel=\"tag\">local government organisation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/locked-out\/\" rel=\"tag\">locked out<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/louisiana\/\" rel=\"tag\">louisiana<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom\/\" rel=\"tag\">ransom<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/robinhood\/\" rel=\"tag\">robinhood<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk\/\" rel=\"tag\">ryuk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk-ransomware\/\" rel=\"tag\">Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/samsam-ransomware\/\" rel=\"tag\">samsam ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/texas\/\" rel=\"tag\">texas<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/' title='Ransomware continues assault against cities and businesses'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2019\/08\/ransomware-continues-assault-against-cities-and-businesses\/\">Ransomware continues assault against cities and businesses<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1191,11169,10420,15715,2247,22721,22722,9161,18276,3765,21939,19317,20562,18277,997,13256],"class_list":["post-16151","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-attack","tag-backup","tag-critical-infrastructure","tag-emotet","tag-florida","tag-local-government-organisation","tag-locked-out","tag-louisiana","tag-ransom","tag-ransomware","tag-robinhood","tag-ryuk","tag-ryuk-ransomware","tag-samsam-ransomware","tag-texas","tag-trickbot"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16151","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16151"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16151\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16151"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16151"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16151"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}