{"id":24431,"date":"2022-05-13T15:59:52","date_gmt":"2022-05-13T14:59:52","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/?p=24431"},"modified":"2022-05-13T16:10:16","modified_gmt":"2022-05-13T15:10:16","slug":"ransomware-ecosystem","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-ecosystem\/24431\/","title":{"rendered":"The ransomware ecosystem: changing the game for the next generation of cybersecurity experts"},"content":{"rendered":"<p>As we celebrate Anti-Ransomware Week, David Emm principal security researcher in Kaspersky\u2019s Global Research &amp; Analysis Team (GReAT) \u2013 recently spoke to a group of students about the evolution of ransomware into the fortified ecosystem it is today and what this means for the cybersecurity community.<\/p>\n<p>Here are the highlights!<\/p>\n<p><strong>From indiscriminate attacks costing hundreds of pounds to targeted attacks costing millions <\/strong><\/p>\n<p>The modern era of ransomware has become increasingly targeted. In the early days, ransomware was distributed indiscriminately \u2013 aimed at anyone and everyone it could reach. Attackers would encrypt data using unsophisticated methods and hope for a pay out of maybe \u00a3300. Their sometimes rudimentary encryption methods meant that cybersecurity experts could not only detect the threat but could often also decrypt the data \u2013 a near impossibility today.<\/p>\n<p>Ransomware developers have since realised that there is much more money to be made by targeting specific organisations. Instead of a few hundred pounds, they can get hundreds of thousands of pounds, and even millions in some cases. The <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2021-statistics\/105205\/\" target=\"_blank\" rel=\"noopener\">number of ransomware samples and blocked attacks<\/a> is on a downward trend but this is only because attackers are focusing on more strategic and impactful attacks rather than on quantity.<\/p>\n<p>The <a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ransomware-wannacry\" target=\"_blank\" rel=\"noopener nofollow\">2017 WannaCry ransomware epidemic<\/a> underlined the impact that a ransomware attack can have on organisations. WannaCry affected 230,000 computers around the world in total, but showed the catastrophic impact on specific organisations. The ransomware affected thousands of NHS hospitals and surgeries across the UK and reportedly caused ambulances to be rerouted. The NHS is estimated to have lost \u00a392 million as a result and the global cost of related attacks was estimated at $4 billion.<\/p>\n<p>In some instances, this <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/jun\/28\/notpetya-ransomware-attack-ukraine-russia\" target=\"_blank\" rel=\"noopener nofollow\">ransomware isn\u2019t even necessarily designed to get money <\/a>\u00a0\u2013 just to sabotage IT systems. This was the case with NotPetya in 2017, which had a significant impact on a number of organisations. For example, hipping company, Maersk <a href=\"https:\/\/www.forbes.com\/sites\/leemathews\/2017\/08\/16\/notpetya-ransomware-attack-cost-shipping-giant-maersk-over-200-million\/\" target=\"_blank\" rel=\"noopener nofollow\">lost between $200 and $300 million<\/a> as a result of this ransomware attack.<\/p>\n<p><strong>Networked vs. hierarchical structure<\/strong><\/p>\n<p>When most people imagine these ransomware gangs, they picture an Ocean\u2019s Eleven-style set up, run by a great criminal mastermind \u2013 and for law enforcement agencies, this would be a far easier adversary to overcome. Instead, ransomware has evolved from individual hierarchical structures into a fully-fledged modular ecosystem\u2013 a whack-a-mole system of replaceable players.<\/p>\n<div id=\"attachment_24432\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-24432\" class=\"wp-image-24432 size-large\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2022\/05\/13144426\/botmaster-1024x513.png\" alt=\"\" width=\"1024\" height=\"513\"><p id=\"caption-attachment-24432\" class=\"wp-caption-text\">The players within this whack-a-mole ransomware ecosystem. (full research available <a href=\"https:\/\/securelist.com\/ransomware-world-in-2021\/102169\/\" target=\"_blank\" rel=\"noopener\">here<\/a>)<\/p><\/div>\n<p>\u00a0<\/p>\n<ul>\n<li>The botmaster: controls the botnet, a robot network of compromised computers under the control of an individual(s) who looks to monetise their point of contact on all compromised computers. This includes through Infrastructure-as-a-Service, Crimeware-as-a-Service or Malware-as-a-Service<\/li>\n<li>Developers: develop the ransomware program and sell their creation to others in the ecosystem<\/li>\n<li>Packers: pack purchased ransomware to make it as fully undetected as possible when it is deployed in the target system<\/li>\n<li>The red team: does the attacking, extending the initial compromise into the wider organisation<\/li>\n<li>Analysts: determine which information is most sensitive and this is used as leverage for ransom demands<\/li>\n<li>Support team: liaises with relevant people in the organisation to persuade them to pay the ransom, explaining that decrypted data will be lost or published if payment is not received<\/li>\n<li>Laundering: seized money is laundered to make it difficult to track. The rise of digitised and electronic payments and banking have made this easier<\/li>\n<\/ul>\n<p><strong>How do cybersecurity experts advise as best practices in this climate?<\/strong><\/p>\n<p>With today\u2019s ransomware, cybersecurity experts are rarely able to find a mechanism for decrypting data. This makes backups, a proactive defence plan and crisis management plans imperative.<\/p>\n<ul>\n<li>Backups \u2013 Backups do not completely mitigate the impact of an attack, as ransomware still needs to be removed and IT teams need to clean up and restore the backup, but they do allow data loss to be minimised and enable companies to save the extortionate money demanded as a ransom. However, not all backups are created equal \u2013 if you can access it, so can the attackers, and it is going to be vulnerable to encryption. So backups must be stored offline. IT teams also need to periodically test that backups can be restored in the event of a crisis.<\/li>\n<li>Crisis management \u2013 IT teams need to make sure their organisation has a plan for secure communications in the event of a ransomware attack. If regular communications are used to interact between teams, attackers will be privy to such communications and can use them as leverage. An alternative plan needs to be developed and practised.<\/li>\n<li>Proactive defence \u2013 Organisations need to implement solutions that allow them to analyse network behaviour for suspicious activities and block attacks before they can cause damage. They also need to implement effective education strategies. This will make employees less prone to falling victim to phishing and other social engineering methods used by attackers to trick staff into running malicious code.<\/li>\n<\/ul>\n<p><strong>To pay or not to pay?<\/strong><\/p>\n<p>Ramsomware gangs are <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-10-15\/treasury-department-offers-crypto-guidance-amid-ransomware-surge\" target=\"_blank\" rel=\"noopener nofollow\">making millions of pounds<\/a> and, even scarier is the prospect of what they can do with those earnings in terms of reinvesting into their own R&amp;D. Our <a href=\"https:\/\/securelist.com\/new-ransomware-trends-in-2022\/106457\/\" target=\"_blank\" rel=\"noopener\">latest research<\/a> found that nearly 75% of UK organisations paid the attackers in order to get their data back. However it is good practice to avoid paying ransoms because this is the oxygen that keeps these groups alive.<\/p>\n<p>Nevertheless, vulnerable organisations are put in extremely difficult circumstances \u2013 particularly those operating <a href=\"https:\/\/abcnews.go.com\/US\/colonial-pipeline-ransomware-cyberattack\/story?id=77599757\" target=\"_blank\" rel=\"noopener nofollow\">critical infrastructure facilities \u2013 because of the impact on business continuity and <\/a>subsequent reputational damage. It is worth noting that Kaspersky was a founding member of <a href=\"http:\/\/www.nomoreransom.org\" target=\"_blank\" rel=\"noopener nofollow\">NoMoreRansom<\/a>, now a broad consortium of industry and police bodies providing free decryptors for victims of ransomware attacks.<\/p>\n<p>As ransomware groups become increasingly formidable, it is the duty of those in the cybersecurity sector to ensure that they are at the forefront of industry trends, developing new and innovative solutions to protect our increasingly interconnected world.<\/p>\n<p><strong>How do we encourage the next generation of cybersecurity professionals?<\/strong><\/p>\n<p>Many people think that they need a computer science degree in order to enter the profession. However, there is a variety of different roles within the industry and a broad range of skills that are needed: not just mathematicians, cryptographers and programmers, but people with writing skills, communications skills and more. Technical skills are important, but equally so is curiosity. For anyone aspiring to a career in cybersecurity, I would recommend Jessica Barker\u2019s <a href=\"https:\/\/www.amazon.co.uk\/Confident-Cyber-Security-Started-Futureproof\/dp\/1789663407\/\" target=\"_blank\" rel=\"noopener nofollow\">\u201cConfident Cyber Security: How to Get Started in Cyber Security and Futureproof Your Career\u201d<\/a>.<\/p>\n<p>The way we handle ransomware has completely changed in the last 15 years or so. The next generation of cybersecurity professionals has a daunting task ahead, staying one-step, and preferably a few ahead of ransomware gangs and other types of attacker. Just as they are evolving, so too is our industry. Every year our abilities to defend against cyber-attacks becomes stronger and more innovative.<\/p>\n<p>Today\u2019s cybersecurity solutions go way beyond the old-fashioned pattern detecting approach characterised as \u2018anti-virus\u2019 \u2013 including the use of generic detection, heuristics, behavioural analysis, emulation and sandboxing techniques. Our experts are continually developing new systems to stay ahead of the latest threats.<\/p>\n<p>To explore careers in cybersecurity, please visit Kaspersky\u2019s <a href=\"https:\/\/careers.kaspersky.com\/\" target=\"_blank\" rel=\"noopener nofollow\">careers page<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware never sits still, as David Emm recently discussed when speaking to a group of students<\/p>\n","protected":false},"author":437,"featured_media":24418,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[3202,584,441,97,529],"class_list":{"0":"post-24431","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-anti-ransomware-day","9":"tag-great","10":"tag-ransomware","11":"tag-security-2","12":"tag-threats"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-ecosystem\/24431\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/anti-ransomware-day\/","name":"Anti-Ransomware Day"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/24431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/437"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=24431"}],"version-history":[{"count":8,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/24431\/revisions"}],"predecessor-version":[{"id":24440,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/24431\/revisions\/24440"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/24418"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=24431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=24431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=24431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}