Over July 4 weekend, perhaps the largest global ransomware incident occured. Behind the attack: REvil, a ransomware cyberhacking collective operating out of Russia. The attack hit at least 17 countries and impacted thousands of businesses. Their demand? $70 million in Bitcoin to de-encrypt all the companies’ data at once.
REvil is just one example of today’s sophisticated hackers. These cybercriminal gangs aren’t messing around with yesterday’s techniques or low-value data. They’re out for more, and knowing what that is can help you take steps to be ready with a plan.
Know Your Enemy: A Look at Today’s Ransomware Hackers
Today’s ransomware attackers are criminals, but they’re also savvy business people who have built multibillion-dollar businesses out of stealing and holding companies’ data hostage. They do their research, they know what data you have (and what data you want to protect), they know who your customers are, and they even know where you purchase your security insurance. They also aren’t afraid to negotiate.
If modern ransomware is a business, sophisticated attack software is their operating model, and ransoms are their revenue. In fact, ransomware attack platforms can even be purchased as a service, which is putting these powerful capabilities into the hands of would-be attackers around the globe. (REvil is a private ransomware-as-a-service [RaaS] operation.) This means it’s not just the big crime syndicates pulling off highly effective attacks. It could be a lone hacker in another country who purchased the software or subscribed to the platform and makes you his or her next target.
Today’s cybercriminals also move fast, compared with yesterday’s hackers who often sat dormant on your network for months, watching and waiting. These attacks are swift and strategic. Even worse, these hackers understand the PR angle of an attack, and they know how to use it. They won’t just take out your systems and steal your data—they’ll exfiltrate sensitive data and threaten to offer it up to news outlets and chat with reporters about the hack unless you pay up.
How Are Ransomware Attacks Being Carried Out?
For a while, the threat of automated ransomware attacks seemed more sinister than the idea of a hacker alone in a basement typing away. However, recent trends show that savvy attackers are moving away from the mass, automated attacks to more nuanced, complex, and targeted attacks. This allows them to be more hands-on, and more precise.
What Data and Systems Are Most Valuable to Cybercriminals?
Cybercriminals know exactly what data will sell for the highest price on the dark web or cause the most chaos if released or even deleted. Today, it’s a lot more complex than just stealing a credit card number, which may sell for as little as a dollar. A patient record is much more valuable in identity theft and can sell for $55 to $85. Cybercriminals are also going after intellectual property (IP)—especially where science and technology are involved, like sensitive product schematics.¹
State and local governments, police departments, and companies that deal in healthcare, education, and manufacturing have some of the most high-value data. But beyond the monetary value, certain data can be valuable in its ability to be disruptive. This includes information that disrupts investigations into open criminal cases, causes reputational damage, or leads to massive regulatory or compliance fines.
Are You a Ransomware Target?
Every company is a viable ransomware target, but some make better—and more lucrative—targets than others.
First, savvy attackers often know better than to go after whales. Carrying out high-profile attacks can put them in the crosshairs of investigators, prosecutors, and news outlets. Once they’ve made the headlines, it’s pretty much over. To stay in the game, many of these groups target mid-sized organizations (1,000-5,000 employees) that are less likely to make the front page.²
Second is a disturbing trend of late: targeting essential service providers that lead to massive outages and widespread disruptions. This is precisely what the REvil hack sought to do, targeting software company Kresaya, and in turn affecting thousands of their customers. Hackers are preying on the urgency to get back online. And paying the ransom can look like the fastest, easiest way to do that. From insurance providers and oil pipelines to city governments and even the security insurance providers we pay to protect us, hackers are figuring out how to put time on their side.
How Can You Avoid Being a Ransomware Victim?
If you have an airtight, holistic prevention, backup, and recovery plan in place, you’re less likely to be a victim of a devastating ransomware attack. However, for companies without the right backup and recovery solutions, paying the ransom may seem faster and easier. Only, paying the ransom comes with zero guarantees. As demonstrated in recent attacks, the bad guys don’t always test their recovery tools thoroughly. The tools can be very slow to restore encrypted data or, even worse, they may not work at all.
Protecting your organization from the effects and costs of a ransomware attack means being prepared at every point along the ransomware lifecycle. That includes having plans for before an attack, during an attack, and after an attack. Pure Storage® has solutions to help at every point.
- Before an attack: Pure can serve as a very fast platform to ingest logs and provide scale-out performance and data tiering for high-speed processing by security analytics tools used by cyber threat hunters.
- During an attack: Pure’s unique and highly differentiated SafeMode™ snapshots provide immutability, so they can’t be changed once written. SafeMode also provides an additional layer of snapshot protection. They can’t be deleted from an array, even by a person or process with administrative credentials. In addition, Pure arrays come with AES-256 encryption that can’t be turned off or disabled and has no performance implication on the array.
- After an attack: Pure’s RapidRestore capability can help recover your data at speeds greater than 270TB/hour. This is hugely important because what matters most after an attack is speed.
Learn more about how to design an airtight, hyper-accessible, and secure data backup architecture with Pure SafeMode snapshots.