SlideShare uma empresa Scribd logo
1 de 28
Valuing Data in the Age of
Ransomware
BUSINESS AND CONSUMER PERCEPTIONS OF DIGITAL EXTORTION
Limor S Kessem
June 2016
Executive Security Advisor
IBM Security
2 IBM Security
Agenda
• What is Ransomware?
• Consumer Perceptions and Experience
• Business Perceptions and Willingness to Pay
• How to Respond to a Ransomware Attack
3 IBM Security
How Did This Even Start?! The Major Milestones
1989
The AIDS Trojan
2005
Misleading Apps
2008
Fake AV
2011
Lockers
“Police Trojans”
2013
Cryptolockers
Drive by
Download
2013
Android
Ransomware
4 IBM Security
Ransomware attachment to spam has skyrocketed
Source: IBM X-Force
5 IBM Security
Locked Up For Good? …It Depends
• Lockers: Win APIs, app loops
• Crypto: Symmetric encryption
̶ Example: AES 56-bit
̶ Advantage: speed, length
̶ Disadvantage: forgetting keys behind
• Crypto: Asymmetric encryption
̶ Example: RSA asymmetric
̶ Advantage: two keys, unique pair for each endpoint
̶ Disadvantage: long and slow
• Double encryption
̶ Encrypt the AES with the RSA
• Android lockers: persistent activity window
The Consumer Take
7 IBM Security
Consumers are confident in their ability to protect computers and
mobile devices but aren’t necessarily taking action to do so
BUT
Overall, consumers are confident that they
can protect personal data on their devices
75% are confident they can
protect data on a personal
computer
67% are confident they can
protect data on a mobile device
6 in 10
Have not taken action in
the past three months to
protect their devices
from being hacked
8 IBM Security
Those taking preventative action are in the minority; avoiding risky
attachments is most common preventative action
71% avoided
opening suspicious
attachments/links in
emails/texts
59% change their
passwords regularly
48% avoided using
or logging into
public Wi-Fi access
points
4 in 10 Have taken action in the past three months
to protect their devices from being hacked
9 IBM Security
Mobile devices and laptops most important devices to protect, also two
most feared for data hacks
60% laptop
64% mobile
47% desktop
32% modem
29% tablet
28% home
security
system
5% wearable
device
8% car
navigation
10% home
devices
16% home wifi
camera
IMPORTANCE OF PROTECTING
DEVICES FROM DATA HACKSLESS MORE
2.Which of the following PERSONAL or HOME electronic devices (whether you use one or not), do you think are most important for people to protect from being hacked? Please
select the THREE you think are the most important. 6. Generally, how afraid are you that your data will be held for ransom, or access will be blocked on a…
10 IBM Security
“Value” of data differs slightly with financial records worth the most
Regardless of data type, roughly 37% would pay over $100 to get data back
Willing to pay $500 or more
8% 20%
Financial Info
Gaming data
PasswordsMusic
Personal emails
Browser
history
14%
Social network data
Online purchase data
DVR Data
Mobile phone data
Other digital photos
Family digital photos
Personal computer access
Health records
11 IBM Security
Consumers: Say they won’t pay, then pay nine fold that amount
Over half of
consumers would
be unwilling to give
a hacker money in
order to get their
data back
Of those who would
pay, they generally
are not willing to
pay more than $100
Consumers are most
willing to pay for
financial data, with a
slim majority of 59%
indicating they would
likely pay
$900
Average ransomware demand
Per current day ransomware variants in the wild
Reality
Check:
41%
Success rate boasted by CryptoLocker
University of Kent research
12 IBM Security
Average Ransomware Fee Can Be Rather High
Cerber:
1 – 2 BTC
Petya:
1.3 BTC
1 BTC =
~ $900 US
Locky:
1 - 2 BTC
Popcorn
Time:
1 BTC
CTB-
Locker:
3 BTC
7ev3n-
HONE$T:
$5,000
13 IBM Security
Consumer response in the event of a data attack varies
Friends/family members are
consistently ranked among the top-2
sources a consumer would go to in
the event of a data attack
Police topped the list in the case of
a home computer (25%) being
hacked but was less likely for the
other cases
In general consumers are
extremely likely (88%) to turn
to someone for help if data is
stolen from one of their
devices
If data is stolen from a smart TV
consumers are more likely to go to a
local electronic store (24%)
If data is stolen from a work/school
computer consumers are most
likely to turn to their work IT
department (40%)
Business Perceptions
15 IBM Security
Business executives are aware of ransomware but lack deeper
knowledge
15
Business
Executives have
heard of
ransomware
3 in 5
Are very
knowledgeable
about the topic
1 in 5
BUT
62% of those who work for larger
sized companies have heard of
ransomware.
VS
55% of those who work for
smaller sized companies
16 IBM Security
SBs are less “data attack” prepared than larger businesses
74% of large
companies
require employees
to regularly change
passwords
74% of large
companies block
some websites
from being used in
the workplace
58% of large
companies offer
training on
workplace IT
security
56% of small
companies
require employees
to regularly change
passwords
56% of small
companies block
some websites
from being used in
the workplace
Only 30% of small
companies offer
training on
workplace IT
security
Large
companies
Small
companies
53% of SBs
77% of medium sized
companies
76% of large companies
Taken action in past
three months to protect
electronic data
17 IBM Security
The majority of executives worry about corporate data hacks
63%
of Business
Executive
Worry About
Data Hacks
Business Executives are most concerned
about financial data being hacked
72% worry about
financial records
68% worry about
email servers/
systems
66% worry about
customer and
sales records
65% worry about
cloud system
access
Less confidence
in ability to
protect
employee vs
company owned
devices
VS
.
-13% pts.
18 IBM Security
Business Executives willing to pay ransom for data recovery
Regardless of
data type,
roughly
60%
of BEs would
pay something
to get data back
from hackers
62%
62%
61%
60%
60%
60%
58%
58%
Financial Records
Customer & Sales Records
Corporate Email System/Server
Intellectual Property
HR Records
Corporate Cloud System
Business Plans
R&D Plans
19 IBM Security
“Value” of data differs slightly with financial records worth the most
Regardless of
data type,
roughly
25%
would pay
$20,000-
$50,000 to get
data back
Willing
to pay
$50K
or
more
15%
9%
Financial Records
Business Plans
R&D Source Code
IP
Corp Email/Cloud HR Records12%
Customer and Sales Records
20 IBM Security
The Larger Companies Experienced Ransomware Before
Ransomware Experience
29% of those who work
at smaller companies
have experience with
ransomware attacks
57% of those who work at
medium sized companies
have experience with
ransomware attacks
53% of those who work at
large sized companies have
experience with ransomware
attacks
21 IBM Security
Previous ransomware experience fairly common; generally willing to
pay to resolve
21
Nearly one in two
of business
executives have
experience with
ransomware attacks
in the workplace
Of those with
experience, 7 in
ten paid to
resolved the
hack
Over half of
those paid over
$10,000…20%
paid over
$40K
22 IBM Security
Responding to an attack: while many companies have taken protective
measures, most know they would benefit from expert consultation
7 in 10 Respondents stated their company has taken action
to protect its electronic data from being hacked
The most useful resources in preventing a hack
58% want best practices to
protect data security was
the most useful
56% stated security expert
consultants are the most
useful
Ransomware Response
24 IBM Security
This is a People Problem
• Blanket user education: from receptionist to CEO
• Launch high visibility, company-wide awareness
campaigns
• Train C-level executives
• Talk to board level stakeholders
• Use planned phishing campaigns to learn
what your users need to know most
25 IBM Security
Read the full IBM Ransomware guide to learn more
Visit the Ransomware landing page
to review the infographic and register
to receive the client engagement
guide
Visit ibm.com/security/services
to learn how IBM Security Services
can help protect your organization
26 IBM Security
Preparation
IBM’s Ransomware Response Guide is
largely occupied by the Preparation
phase of the Incident Lifecycle.
Once the organization has been hit by
ransomware, few options remain.
Sources: NIST 800-61R2, IBM’s Ransomware Response Guide
ibm.com/security
securityintelligence.com
xforce.ibmcloud.com
@ibmsecurity
youtube/user/ibmsecuritysolutions
© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any
statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the
International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper
access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be
considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful,
comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems,
products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.
FOLLOW US ON:
THANK YOU
28 IBM Security
Annex: Resources
• http://phishme.com/locky-a-new-encryption-ransomware-borrowing-ideas-from-the-best/
• Symantec: The-evolution-of-ransomware
• http://www.symantec.com/connect/blogs/cryptodefense-cryptolocker-imitator-makes-over-34000-one-month
• http://thehackernews.com/2016/01/javascript-ransomware-malware.html
• http://news.thewindowsclub.com/samas-ransomware-changes-way-ransomware-operates-82755/
• https://blog.fox-it.com/2016/05/02/ransomware-deployments-after-brute-force-rdp-attack/
• http://www.staradvertiser.com/breaking-news/interpol-philippines-bust-cyber-extortion-network/
• http://krebsonsecurity.com/2016/01/ransomware-a-threat-to-cloud-services-too/
• http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-bill-curb-the-extortion-malware-epidemic
• https://threatpost.com/criminals-peddling-affordable-alphalocker-ransomware/117888/
• http://researchcenter.paloaltonetworks.com/2016/05/unit42-bucbi-ransomware-is-back-with-a-ukrainian-makeover/

Mais conteúdo relacionado

Mais procurados

Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
 

Mais procurados (20)

Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Top 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS SolutionTop 5 Things to Look for in an IPS Solution
Top 5 Things to Look for in an IPS Solution
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
Outsmart Fraudsters: Give Customers Great User Experience While Keeping Fraud...
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017Top 12 Cybersecurity Predictions for 2017
Top 12 Cybersecurity Predictions for 2017
 
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection SuiteThe Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
QRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the MouseQRadar & XGS: Stopping Attacks with a Click of the Mouse
QRadar & XGS: Stopping Attacks with a Click of the Mouse
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & InvestmentThe ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
 
Failed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated RansomwareFailed Ransom: How IBM XGS Defeated Ransomware
Failed Ransom: How IBM XGS Defeated Ransomware
 

Destaque

Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 
PE Department Slideshow
PE Department SlideshowPE Department Slideshow
PE Department Slideshow
Tommy Malins
 

Destaque (13)

Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
What’s the State of Your Endpoint Security?
What’s the State of Your    Endpoint Security?What’s the State of Your    Endpoint Security?
What’s the State of Your Endpoint Security?
 
Logikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama PapersLogikcull Webinar: Preventing the Next Panama Papers
Logikcull Webinar: Preventing the Next Panama Papers
 
Malware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient TruthMalware on Smartphones and Tablets: The Inconvenient Truth
Malware on Smartphones and Tablets: The Inconvenient Truth
 
Enterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entitiesEnterprise security: ransomware in enterprise and corporate entities
Enterprise security: ransomware in enterprise and corporate entities
 
Animated eDMs and eCards
Animated eDMs and eCardsAnimated eDMs and eCards
Animated eDMs and eCards
 
PE Department Slideshow
PE Department SlideshowPE Department Slideshow
PE Department Slideshow
 
Trabajo Nº 4 - Proyecto Pueblos Originarios de Chile
Trabajo Nº 4 - Proyecto Pueblos Originarios de ChileTrabajo Nº 4 - Proyecto Pueblos Originarios de Chile
Trabajo Nº 4 - Proyecto Pueblos Originarios de Chile
 
Newsbrands and social media
Newsbrands and social mediaNewsbrands and social media
Newsbrands and social media
 
Benefits Of Chiropractic Care For Pregnant Women
Benefits Of Chiropractic Care For Pregnant WomenBenefits Of Chiropractic Care For Pregnant Women
Benefits Of Chiropractic Care For Pregnant Women
 
Virtual Reality
Virtual RealityVirtual Reality
Virtual Reality
 
Calendar 2017 • Citygas
Calendar 2017 • CitygasCalendar 2017 • Citygas
Calendar 2017 • Citygas
 

Semelhante a Valuing Data in the Age of Ransomware

Semelhante a Valuing Data in the Age of Ransomware (20)

Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?Data Breaches: Is IBM i Really at Risk?
Data Breaches: Is IBM i Really at Risk?
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data AnalyticsSecurity Intelligence: Finding and Stopping Attackers with Big Data Analytics
Security Intelligence: Finding and Stopping Attackers with Big Data Analytics
 
Mobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging RisksMobile Payments: Protecting Apps and Data from Emerging Risks
Mobile Payments: Protecting Apps and Data from Emerging Risks
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Cybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized BusinessesCybersecurity Myths for Small and Medium-Sized Businesses
Cybersecurity Myths for Small and Medium-Sized Businesses
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Train like you fight
Train like you fightTrain like you fight
Train like you fight
 
IBM Qradar & resilient
IBM Qradar & resilientIBM Qradar & resilient
IBM Qradar & resilient
 
Kista watson summit final public version
Kista watson summit final public versionKista watson summit final public version
Kista watson summit final public version
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy SectorIBM: Cognitive Security Transformation for the Enrgy Sector
IBM: Cognitive Security Transformation for the Enrgy Sector
 
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael MontecilloLuncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
Luncheon - 2016-05-19 IBM Security - Threat Intelligence by Michael Montecillo
 
Cybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To KnowCybersecurity- What Retailers Need To Know
Cybersecurity- What Retailers Need To Know
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and ResponseSafer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
 

Mais de IBM Security

Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
IBM Security
 

Mais de IBM Security (15)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
Compliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies aheadCompliance is a pit stop – your destination lies ahead
Compliance is a pit stop – your destination lies ahead
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 

Valuing Data in the Age of Ransomware

  • 1. Valuing Data in the Age of Ransomware BUSINESS AND CONSUMER PERCEPTIONS OF DIGITAL EXTORTION Limor S Kessem June 2016 Executive Security Advisor IBM Security
  • 2. 2 IBM Security Agenda • What is Ransomware? • Consumer Perceptions and Experience • Business Perceptions and Willingness to Pay • How to Respond to a Ransomware Attack
  • 3. 3 IBM Security How Did This Even Start?! The Major Milestones 1989 The AIDS Trojan 2005 Misleading Apps 2008 Fake AV 2011 Lockers “Police Trojans” 2013 Cryptolockers Drive by Download 2013 Android Ransomware
  • 4. 4 IBM Security Ransomware attachment to spam has skyrocketed Source: IBM X-Force
  • 5. 5 IBM Security Locked Up For Good? …It Depends • Lockers: Win APIs, app loops • Crypto: Symmetric encryption ̶ Example: AES 56-bit ̶ Advantage: speed, length ̶ Disadvantage: forgetting keys behind • Crypto: Asymmetric encryption ̶ Example: RSA asymmetric ̶ Advantage: two keys, unique pair for each endpoint ̶ Disadvantage: long and slow • Double encryption ̶ Encrypt the AES with the RSA • Android lockers: persistent activity window
  • 7. 7 IBM Security Consumers are confident in their ability to protect computers and mobile devices but aren’t necessarily taking action to do so BUT Overall, consumers are confident that they can protect personal data on their devices 75% are confident they can protect data on a personal computer 67% are confident they can protect data on a mobile device 6 in 10 Have not taken action in the past three months to protect their devices from being hacked
  • 8. 8 IBM Security Those taking preventative action are in the minority; avoiding risky attachments is most common preventative action 71% avoided opening suspicious attachments/links in emails/texts 59% change their passwords regularly 48% avoided using or logging into public Wi-Fi access points 4 in 10 Have taken action in the past three months to protect their devices from being hacked
  • 9. 9 IBM Security Mobile devices and laptops most important devices to protect, also two most feared for data hacks 60% laptop 64% mobile 47% desktop 32% modem 29% tablet 28% home security system 5% wearable device 8% car navigation 10% home devices 16% home wifi camera IMPORTANCE OF PROTECTING DEVICES FROM DATA HACKSLESS MORE 2.Which of the following PERSONAL or HOME electronic devices (whether you use one or not), do you think are most important for people to protect from being hacked? Please select the THREE you think are the most important. 6. Generally, how afraid are you that your data will be held for ransom, or access will be blocked on a…
  • 10. 10 IBM Security “Value” of data differs slightly with financial records worth the most Regardless of data type, roughly 37% would pay over $100 to get data back Willing to pay $500 or more 8% 20% Financial Info Gaming data PasswordsMusic Personal emails Browser history 14% Social network data Online purchase data DVR Data Mobile phone data Other digital photos Family digital photos Personal computer access Health records
  • 11. 11 IBM Security Consumers: Say they won’t pay, then pay nine fold that amount Over half of consumers would be unwilling to give a hacker money in order to get their data back Of those who would pay, they generally are not willing to pay more than $100 Consumers are most willing to pay for financial data, with a slim majority of 59% indicating they would likely pay $900 Average ransomware demand Per current day ransomware variants in the wild Reality Check: 41% Success rate boasted by CryptoLocker University of Kent research
  • 12. 12 IBM Security Average Ransomware Fee Can Be Rather High Cerber: 1 – 2 BTC Petya: 1.3 BTC 1 BTC = ~ $900 US Locky: 1 - 2 BTC Popcorn Time: 1 BTC CTB- Locker: 3 BTC 7ev3n- HONE$T: $5,000
  • 13. 13 IBM Security Consumer response in the event of a data attack varies Friends/family members are consistently ranked among the top-2 sources a consumer would go to in the event of a data attack Police topped the list in the case of a home computer (25%) being hacked but was less likely for the other cases In general consumers are extremely likely (88%) to turn to someone for help if data is stolen from one of their devices If data is stolen from a smart TV consumers are more likely to go to a local electronic store (24%) If data is stolen from a work/school computer consumers are most likely to turn to their work IT department (40%)
  • 15. 15 IBM Security Business executives are aware of ransomware but lack deeper knowledge 15 Business Executives have heard of ransomware 3 in 5 Are very knowledgeable about the topic 1 in 5 BUT 62% of those who work for larger sized companies have heard of ransomware. VS 55% of those who work for smaller sized companies
  • 16. 16 IBM Security SBs are less “data attack” prepared than larger businesses 74% of large companies require employees to regularly change passwords 74% of large companies block some websites from being used in the workplace 58% of large companies offer training on workplace IT security 56% of small companies require employees to regularly change passwords 56% of small companies block some websites from being used in the workplace Only 30% of small companies offer training on workplace IT security Large companies Small companies 53% of SBs 77% of medium sized companies 76% of large companies Taken action in past three months to protect electronic data
  • 17. 17 IBM Security The majority of executives worry about corporate data hacks 63% of Business Executive Worry About Data Hacks Business Executives are most concerned about financial data being hacked 72% worry about financial records 68% worry about email servers/ systems 66% worry about customer and sales records 65% worry about cloud system access Less confidence in ability to protect employee vs company owned devices VS . -13% pts.
  • 18. 18 IBM Security Business Executives willing to pay ransom for data recovery Regardless of data type, roughly 60% of BEs would pay something to get data back from hackers 62% 62% 61% 60% 60% 60% 58% 58% Financial Records Customer & Sales Records Corporate Email System/Server Intellectual Property HR Records Corporate Cloud System Business Plans R&D Plans
  • 19. 19 IBM Security “Value” of data differs slightly with financial records worth the most Regardless of data type, roughly 25% would pay $20,000- $50,000 to get data back Willing to pay $50K or more 15% 9% Financial Records Business Plans R&D Source Code IP Corp Email/Cloud HR Records12% Customer and Sales Records
  • 20. 20 IBM Security The Larger Companies Experienced Ransomware Before Ransomware Experience 29% of those who work at smaller companies have experience with ransomware attacks 57% of those who work at medium sized companies have experience with ransomware attacks 53% of those who work at large sized companies have experience with ransomware attacks
  • 21. 21 IBM Security Previous ransomware experience fairly common; generally willing to pay to resolve 21 Nearly one in two of business executives have experience with ransomware attacks in the workplace Of those with experience, 7 in ten paid to resolved the hack Over half of those paid over $10,000…20% paid over $40K
  • 22. 22 IBM Security Responding to an attack: while many companies have taken protective measures, most know they would benefit from expert consultation 7 in 10 Respondents stated their company has taken action to protect its electronic data from being hacked The most useful resources in preventing a hack 58% want best practices to protect data security was the most useful 56% stated security expert consultants are the most useful
  • 24. 24 IBM Security This is a People Problem • Blanket user education: from receptionist to CEO • Launch high visibility, company-wide awareness campaigns • Train C-level executives • Talk to board level stakeholders • Use planned phishing campaigns to learn what your users need to know most
  • 25. 25 IBM Security Read the full IBM Ransomware guide to learn more Visit the Ransomware landing page to review the infographic and register to receive the client engagement guide Visit ibm.com/security/services to learn how IBM Security Services can help protect your organization
  • 26. 26 IBM Security Preparation IBM’s Ransomware Response Guide is largely occupied by the Preparation phase of the Incident Lifecycle. Once the organization has been hit by ransomware, few options remain. Sources: NIST 800-61R2, IBM’s Ransomware Response Guide
  • 27. ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions © Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party. FOLLOW US ON: THANK YOU
  • 28. 28 IBM Security Annex: Resources • http://phishme.com/locky-a-new-encryption-ransomware-borrowing-ideas-from-the-best/ • Symantec: The-evolution-of-ransomware • http://www.symantec.com/connect/blogs/cryptodefense-cryptolocker-imitator-makes-over-34000-one-month • http://thehackernews.com/2016/01/javascript-ransomware-malware.html • http://news.thewindowsclub.com/samas-ransomware-changes-way-ransomware-operates-82755/ • https://blog.fox-it.com/2016/05/02/ransomware-deployments-after-brute-force-rdp-attack/ • http://www.staradvertiser.com/breaking-news/interpol-philippines-bust-cyber-extortion-network/ • http://krebsonsecurity.com/2016/01/ransomware-a-threat-to-cloud-services-too/ • http://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/ransomware-bill-curb-the-extortion-malware-epidemic • https://threatpost.com/criminals-peddling-affordable-alphalocker-ransomware/117888/ • http://researchcenter.paloaltonetworks.com/2016/05/unit42-bucbi-ransomware-is-back-with-a-ukrainian-makeover/