sb-eu logo
Story image

Cybercrime selling like hotcakes: Ransomware sales soar 2500% in one year

28 Nov 2017

The way criminals ply their trade has changed dramatically since the rise of the digital era, and not for the better – at least for the victims.

“Twenty years ago, if a crime boss wanted to get rich quick, they’d get a crew together, buy some hot guns, steal a getaway car and rob a bank. In the digital era, stealing massive sums of money is much less risky, and a lot less dramatic,” says Emmanuel Marshall from MailGuard.

“To make a big score in 2017 all criminals need to do is get on the dark web, buy some ready-made ransomware and start firing out emails. It won’t even cost them a lot of money to get started; basic ransomware can be had for a few dollars and run on a phone.”

Marshall says today there are sophisticated and comprehensive operations making and supplying ransomware that even provide IT support to their criminal customers.

Carbon Black recently released a report that revealed sales of ransomware on the dark web have skyrocketed an almost ridiculous 2,500 percent since 2016.

“Basic ransomware can be had for as little as US$0.50 in the illicit software marketplace, so it’s little wonder that this is a booming industry,” says Marshall.

“Because ready-made ransomware is so cheap and ubiquitous now, it’s no longer only malevolent geeks who are capable of running email scams; pretty much anyone with an internet connection, a few dollars and a conveniently sub-par conscience can get into the ransomware racket.”

Furthermore, every single one of the businesses surveyed in the Carbon Black report would be willing to pay a ransom if their files and documents were rendered inaccessible by malware.

Given this amount of ‘willingness’, it’s certainly not hard to see why the sale of ransomware has shot up so much.

“At this point you might be thinking, ‘well it probably won’t happen to my business and even if it does we’ll just pay the ransom and get on with it.’ It might seem like a small inconvenience to deal with a ransomware scam; pay a few thousand dollars and get your files back,” says Marshall.

“The thing business owners forget to factor in is the collateral damage done by a ransomware attack. With the computer system locked up, business will pretty much grind to a standstill.”

This means no communications, no access to accounts, no payroll facilities, and no ability to do work of any kind until the ransom is paid – and even then, there is no guarantee that the criminals will restore access.

“Add to the above, the damage to a company's reputation that being involved in a ransom attack will cause, and the cost of lost opportunities during the time that the computer system is frozen, and you are potentially talking hundreds of thousands of dollars in collateral losses,” says Marshall.

“The impact from cybercrime attacks resonates through every aspect of a company’s business. The perceived vulnerability to attack erodes an organisation’s standing with supply chain partners, investors and the public alike.”

Marshall cited Brad Smith of Microsoft who presented a keynote speech at Microsoft Inspire 2017 to illiustrate that while most businesses use some sort of endpoint virus protection on their computer systems, there is a dawning realisation in the IT world that such measures are no longer effective.

“You can’t defeat the threats of the present with the tools of the past. What we’ve learned is that 90% of all security intrusions start the same way, with an email and a link that takes somebody to a harmful website. Every company has at least one employee who will click on anything, and that is pretty hard to protect against,” says Brad Smith, president and CLO of Microsoft.

In terms of advice for this ransomware epidemic, Marshall says the most commonly recommended protection from ransomware attacks is to practice regular automated backups of important files and data to an off-site storage facility.

However this isn’t always possible (particularly for SMBs), so at the very basic level you should NEVER click on links from unfamiliar email senders and always verify the email is actually from the purported sender by clicking on the ‘details’ box at the top of the message.

Story image
Proofpoint enhances security awareness training platform
Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence.More
Story image
Global DDoS attacks: What they are, how they work, and how to defend against them
Do not pay the ransom, and do make sure you've got strong DDoS protection, security firms warn.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Gartner predicts 75% of CEOs to be liable for cyber-physical security incidents by 2024
The nature of CPSs means incidents can quickly lead to physical harm to people, destruction of property or environmental disasters – and Gartner’s new research indicates that these incidents will increase drastically in the next few years if the lack of spending on these assets continues.More
Story image
Acronis announces new security endpoint solution
The solution is an integration of data protection and cybersecurity which provides customers with effective endpoint protection in a landscape where the pointlessness of perimeter security is becoming more pronounced.More
Story image
Interview: Check Point profiles 5 battles that SOC teams face in 2020
Security operations centres (SOCs) are often the first lines of defence.More