If ransomware were a person, then it must be Alan Partridge, it just keeps bouncing back!
I have been speaking about this very annoying yet simple problem to fix since 2015, just a reminder its 2019 and still Ransomware dominates news headlines and talk tracks from vendors. Forewarning this article is loaded with Partridge quotes, sorry…..
I recall speaking in Boston at ZertoCON 2015, 16 & 17 deep diving how ransomware works, and throwing out scary statistics like “50% of organizations believe they are not prepared to combat a ransomware attack” and guess what those predictions are still here today, I do think the scare tactics were a a bit Alan Partridge:
“The temperature inside this apple turnover is over 1,000 degrees. If I squeeze it, a jet of molten bramley apple will squirt out. Could go your way; could go mine. Either way, one of us is going down.”
- A new organization will fall victim to ransomware every 14 seconds in 2019, and every 11 seconds by 2021. (Source: Cyber Security Ventures)
- 1.5 million new phishing sites are created every month. (Source: webroot.com)
Ransomware attacks have increased over 97 percent in the past two years. (Source: Phishme)
- A total of 850.97 million ransomware infections were detected by the institute in 2018.
- 34% of businesses hit with malware took a week or more to regain access to their data. (Source: Kaspersky)
- In 2019 ransomware from phishing emails increased 109 percent over 2017. (Source: PhishMe)
And it goes on…….
- An IBM study suggested that over a quarter of all companies would pay more than $20,000 to hackers to retrieve data that had been stolen.
- Ransomware generates over $25 million in revenue for hackers each year. (Source: Business Insider)
- The NotPetya ransomware attack cost FedEx $300 million in Q1 2017. (Source: Reuters)
- More than half of ransoms were paid bitcoin.
- The average ransom demand increased in 2018 to $1,077.
- Ten percent of all ransom demands are over $5,000. (Source: Datto)
- Fewer than a third of organizations who pay the ransom receive all of their money back. (Source: Courant
- 97% of United States’ companies refused to pay a ransom. 75% of Canadian companies paid, followed by, 22% of German businesses, and 58% in the UK.
- 81 % of cybersecurity experts believe there will be a record number of ransomware attacks in 2019. (Source: CIO Dive)
- McAfee analysts suggest that individuals with a large number of connected devices and a high net worth are some of the most attractive targets.
- Attacks against Linux and Macs are expected to rise, according to IT Security Guru.
- The average costs of data breaches will reach into the hundreds of millions of dollars by 2020. (Source: Juniper Research)
- Recent studies have shown that ransomware attacks are increasing more than 300% year over year. (dimensiondata.com)
- Cybercriminals will target SaaS (Software as a Service) and cloud computing businesses, which store and secure private data. (Source: Massachusetts Institute of Technology)
- The cyber security research body suggests that ransomware damage costs will rise to $11.5 billion in 2019.
- Mobile malware, banking malware, and ransomware are the primary threats to expect in 2019 according to Fortinet.
- The Internet of Things (IoT) is primed to revolutionize life for businesses and consumers alike. However, the inherent vulnerability of this nascent technology can leave it wide open to ransomware attacks. A report by Kaspersky Lab indicated that new malware targeting IoT enabled devices grew threefold in 2018. Since 2017, the number of IoT focused malware attacks rose 10x from 2016.
“Needless to say, I had the last laugh”
And even crazier now some organizations have been paying attackers their ransom to release / un-encrypt their systems. That is beyond comprehension in my book on this, it is annoying after all that has happened with ransomware, it still actually exists.
Attackers used to deliver / distribute malware with a spray and pray approach, since certainly “WannaCry” they have got smarter and target organizations who have legacy IT systems, security practices, essentially anyone they think is vulnerable & hold critical data. Unfortunately companies that fit that profile are often within the public eye such as government or public organizations and well the end result is that Alan keeps bouncing back! Just look at the recent infrastructure targets within cities and towns, post here explaining the Bruce Willis one if you are interested.
There have also been cases where Ransomware is used to mask a wider breach or data theft.
What is even more annoying with this, is everyone jumps to recovery solutions and front end protection solutions all without little thought about what they could do today within their environment to minimize risk across people and technology, see very outdated post here.
“Because I’m a soft target. They’re not going to go for the Prime Minister, he’s surrounded by bouncers. Yet everyone knows I will be in Swaffham at 3pm”
This has been more of a rant than a factual post so I do apologize, I just do not see progress on our ability to deal with ransomware and watching companies be struck by this is annoying. Ransomware will continues on targeting soft targets, what we should be asking is why these attacks happened in those organizations and / or was it a smoke screen for something else not paying the ransom!
Like Alan’s book “Bouncing back” I sincerely hope ransomware gets pulped soon, although if you are interested it is still available in second hand shops in the Norfolk area.
See you on the horizon no doubt ransomware!