SlideShare uma empresa Scribd logo
1 de 52
Baixar para ler offline
WHAT THE KIDNAPPING & RANSOM ECONOMY
TEACHES US ABOUT RANSOMWARE
JEREMIAH GROSSMAN
CHIEF OF SECURITY STRATEGY
@jeremiahg
https://www.jeremiahgrossman.com/
http://blog.jeremiahgrossman.com/
http://sentinelone.com/
BIO
WHO I AM…
▸Professional Hacker
▸Black Belt in Brazilian Jiu-Jitsu
▸Founder of WhiteHat Security
MY FIRST ‘PERSONAL’ EXPERIENCE
WITH CYBER-EXTORTION
2005
“THE FBI RECENTLY PUBLISHED
THAT RANSOMWARE VICTIMS
PAID OUT $209 MILLION IN Q1
2016 COMPARED TO $24
MILLION FOR ALL OF 2015.”
LA Times
THE BIRTH OF A BILLION DOLLAR CYBER-CRIME INDUSTRY
JUST OVER 10 YEARS LATER…
DEC 11, 1989: 20,000
ENVELOPES CONTAINING 5
1/4" FLOPPY DISKS LOADED
W/ THE FIRST KNOWN
RANSOMWARE (‘AIDS')
WERE MAILED.
MEDICAL CARE TRANSPORTATION GOVERNMENT
EDUCATION POLICE IOT
SECURITY PEOPLE HOTELS
“FAMILY MEMBER'S TV IS BRICKED BY
ANDROID MALWARE. #LG WONT
DISCLOSE FACTORY RESET. AVOID
THESE "SMART TVS" LIKE THE
PLAGUE.”
TWITTER
INTERNET OF THINGS
“A 'RANSOMWARE' PROGRAM HAD
INFECTED HIS COMPUTER ALLOWING
THE HACKERS TO FILM HIM THROUGH
THE WEBCAM. HE HAD BEEN FILMED
IN A COMPROMISING SITUATION. NOW
THEY WANTED MONEY.”
ABC AU
PEOPLE
“ONE OF EUROPE'S TOP HOTELS HAS
ADMITTED THEY HAD TO PAY THOUSANDS IN
BITCOIN RANSOM TO CYBERCRIMINALS
WHO MANAGED TO HACK THEIR ELECTRONIC
KEY SYSTEM, LOCKING HUNDREDS OF
GUESTS OUT OF THEIR ROOMS UNTIL THE
MONEY WAS PAID.”
The Local
HOTELS
“A RANSOMWARE ATTACK TOOK TICKET
MACHINES FOR SAN FRANCISCO'S LIGHT
RAIL TRANSIT SYSTEM OFFLINE ALL DAY
SATURDAY DURING ONE OF THE BUSIEST
SHOPPING WEEKENDS OF THE YEAR, BUT
RATHER THAN SHUTTING DOWN, THE
AGENCY DECIDED INSTEAD TO LET USERS
RIDE FOR FREE.”
USA TODAY
TRANSPORTATION
“CRIMINALS INFECTED 70 PERCENT OF
STORAGE DEVICES TIED TO CLOSED-
CIRCUIT TVS IN WASHINGTON DC
EIGHT DAYS BEFORE THE
INAUGURATION OF PRESIDENT
DONALD TRUMP.”
The Register
EVENT SECURITY
“THE ATTACK FORCED DEPARTMENTS
SUCH AS THE LICKING COUNTY 911
CENTER, COUNTY AUDITOR'S OFFICE
AND CLERK OF COURTS TO PERFORM
THEIR JOBS WITHOUT THE USE OF
COMPUTERS OR OFFICE
TELEPHONES.”
Newark Advocate
EMERGENCY SERVICES
“LOST DATA GOES BACK TO 2009. DATA
FROM THAT PERIOD BACKED UP ON DVDS
AND CDS REMAINED INTACT. WHILE
ARCHIVED DATA HAS ITS IMPORTANCE,
MORE WORRYING IS THAT THE DEPARTMENT
LOST DATA FROM ONGOING
INVESTIGATIONS.”
Bleeping Computer
LAW ENFORCEMENT
“THE TRUST DID NOT PAY ANY
RANSOM AS A RESULT OF THE ATTACK
BUT IT DID HAVE TO CANCEL 2,800
PATIENT APPOINTMENTS DURING 48
HOURS WHEN IT SHUT DOWN
SYSTEMS.”
The Telegraph
MEDICAL CARE
INDUSTRY REPORTS, DATA, AND ANECDOTES
IBM SECURITY’S X-FORCE
70% OF ENTERPRISE RANSOMWARE VICTIMS PAID UP.
20% OF COMPROMISED ORGANIZATIONS PAID RANSOMS OF
MORE THAN $40,000 (USD).
25% HAVE PAID BETWEEN $20,000 (USD) AND $40,000 (USD).
(DEC, 2016)
SENTINELONE
OVER THE PAST 12 MONTHS, 50% OF ORGANIZATIONS HAVE
RESPONDED TO A RANSOMWARE CAMPAIGN.
THOSE ORGANIZATIONS THAT SUFFERED A RANSOMWARE
ATTACK IN THE PAST 12 MONTHS, 85% STATED THAT THEY WERE
HIT WITH THREE OR MORE ATTACKS.
(NOV, 2016)
KASPERSKY LAB
THE NUMBER OF RANSOMWARE INFECTIONS SUFFERED BY
COMPANIES UP 3-FOLD FROM JANUARY TO SEPTEMBER.
1-IN-5 BUSINESSES WORLDWIDE HAS BEEN VICTIMS OF A
RANSOMWARE AND THE RATE OF RANSOMWARE ATTACKS
INCREASED FROM ONE EVERY 2-MIN TO ONE EVERY 40-SEC.
(DEC, 2016)
KASPERSKY LAB
THE RANSOMWARE LANDSCAPE
▸Not all critical systems are backed-up
▸Your Anti-Virus software SUCKS
▸Infection rates rising fast (still)
▸Rising ransom demands
▸CFOs - or their law firms - must learn how to transact in Bitcoin
▸Innovation in business models, victim targeting, and malware
▸Cyber-Insurance reimbursement
KIDNAPPING & RANSOM
“K&R”
REPORTEDLY A $500 MILLION (USD) MARKET
”IN 75 BCE, 25-YEAR-OLD JULIUS CAESAR
WAS SAILING THE AEGEAN SEA WHEN HE WAS
KIDNAPPED BY CILICIAN PIRATES. WHEN THE
PIRATES ASKED FOR A RANSOM OF 20
TALENTS OF SILVER, CAESAR LAUGHED AT
THEIR FACES. THEY DIDN'T KNOW WHO THEY
HAD CAPTURED, HE SAID, AND DEMANDED
THAT THEY ASK FOR 50 (1550 KG OF SILVER),
BECAUSE 20 TALENTS WAS SIMPLY NOT
ENOUGH.”
“ON OCT 22, THE FAMILY OF
BILLIONAIRE PEARL ORIENTAL OIL
CHAIRMAN WONG YUK-KWAN
PAID TAIWANESE KIDNAPPERS
$1.68 MILLION (USD) IN BITCOIN
AFTER THEY THREATENED TO “DIG
OUT THE EYEBALLS OR CHOP OFF
THE LEGS” OF YUK-KWAN.”
"MOST OF SOMALIA'S MODERN-DAY PIRATES ARE FISHERMEN WHO
TRADED NETS FOR GUNS. THEY'VE LEARNED THAT RANSOM IS MORE
PROFITABLE THAN ROBBERY, AND RATHER THAN SQUANDERING THEIR
LOOT, THEY REINVEST IN EQUIPMENT AND TRAINING."
“AN ORDINARY SOMALI EARNS ABOUT
$600 (USD) A YEAR, BUT EVEN THE
LOWLIEST FREEBOOTER CAN MAKE
NEARLY 17 TIMES THAT — $10,000
(USD) — IN A SINGLE HIJACKING.
NEVER MIND THE RISK; IT'S LESS
DANGEROUS THAN LIVING IN WAR-
TORN MOGADISHU.”
“FEWER THAN 1-IN-3 HIJACK ATTEMPTS IS SUCCESSFUL. A
SAVVY CAPTAIN CAN WARD OFF MARAUDERS BY
MANEUVERING THE SHIP TO CREATE A TURBULENT WAKE
WHILE CALLING FOR HELP. IF THE ATTACKERS DON'T BOARD
WITHIN 15-MIN, A NEARBY NAVAL SHIP MIGHT SEND A
HELICOPTER GUNSHIP. ONCE THE PIRATES CONTROL THE
VESSEL, THOUGH, IT'S GAME OVER: LIKE CONVENIENCE-
STORE CLERKS, CREWS ARE TRAINED NOT TO RESIST.”
HIGH SEAS PIRACY
PIRACY MISSION SET-UP & COSTS
▸$50K-$250K (USD) in seed capital
▸Crew of 12-24 men (varied skills)
▸Speed boats, larger ship to launch boats, caterer, ladders,
ropes, intelligence, weapons, communications, etc
▸Select targets by the cargo, owner, and port of origin
▸“Trustworthy” financial system for money-laundering
DIVISION OF LABOR
BACK OFFICE LOGISTICS
▸Tribe Elders: Liaisons with the outside world.
▸Financiers: Capital comes from local businessmen as well as the Islamist militant
group.
▸Commander: Marshal resources, recruits crew, and organizes operations.
▸Security Squad: Protects the commander, ferries supplies and backs up attackers.
▸Mother Ship Crew Attack Squad: Extends the marauders' reach hundreds of
miles out to sea; Carries attack squad made up of fishermen.
▸Negotiators: English speaking; Point of contact for the hostage takers.
IT’S JUST BUSINESS
NEGOTIATION PROCESS
▸May take days, weeks, months — sometimes years
▸Negotiations by professional K&R consultants (ex-
military, law enforcement, or intelligence)
▸No “supernormal profits.”
"Pirates routinely demand far more than they expect to receive. For catches with valuable cargo,
bargaining can open at 10 times the previously highest settlement. The limiting factor is time:
With each passing day, chances increase that a hostage will die or the ship will become damaged,
and the likelihood of a peaceful resolution — and a fat bag of cash — dwindles."
“ONE NEW TECHNIQUE IS TO AIRDROP THE MONEY. A MILLION
DOLLARS IN $100 NOTES WEIGHS ABOUT 29 POUNDS. IT IS
PLACED INTO A CONTAINER LIKE AN INFLATABLE BALL AND
DROPPED OUT OF AN AIRPLANE USING A PARACHUTE GUIDED
BY A GLOBAL POSITIONING SYSTEM.”
GETTING PAID
DIVVYING UP THE BOOTY
▸Reimbursement of supplier(s)
▸Financiers: 30-70% of the ransom
▸Elders: 5-10 %of the ransom (anchoring rights)
▸Crew: Remaining sum divided up by shares
“ Gullestrup's ship and crew were returned safely, although the pirates didn't actually want to get
off the ship right away. That's because they were afraid of getting robbed by other pirates on their
way back to shore, Gullestrup says, so he gave them a ride north, dropping them closer to home.”
PREVENTION AND RESPONSE
HIGH-SEAS PIRACY PREVENTION
▸Armed private security guards on board ships
▸Shippers harden vessels or take evasive action
▸A change in Somalia at national and local level
▸Pre-emptive action by combined navies in the region
▸Britney Spears
“It lasted just a few minutes, with a helicopter crew launching from a ship just offshore and raking
beached and unmanned pirate speedboats - known as "skiffs" - with machine-gun fire. Fuel stores
and other equipment were also fired on, but EU Navfor says there were no casualties on either
side and there were no European "boots on the ground".
“HER SONGS WERE CHOSEN BY THE
SECURITY TEAM BECAUSE THEY THOUGHT
THE PIRATES WOULD HATE THEM MOST.
THESE GUYS CAN'T STAND WESTERN
CULTURE OR MUSIC, MAKING BRITNEY'S
HITS PERFECT. AS SOON AS THE PIRATES
GET A BLAST OF BRITNEY, THEY MOVE ON
AS QUICKLY AS THEY CAN."
NBC News
LAW ENFORCEMENT
KIDNAPPING & RANSOM
INSURANCE
ORIGINATED FOLLOWING THE KIDNAPPING OF CHARLES
LINDBERGH’S BABY IN 1932. THE BOOST IN POLICIES
BEGAN IN THE LATE 70’S.
“K&R INSURANCE IS DESIGNED TO PROTECT
INDIVIDUALS AND CORPORATIONS
OPERATING IN HIGH-RISK AREAS AROUND
THE WORLD. LOCATIONS MOST OFTEN
NAMED IN POLICIES INCLUDE MEXICO,
VENEZUELA, HAITI, AND NIGERIA, CERTAIN
OTHER COUNTRIES IN LATIN AMERICA, AS
WELL AS SOME PARTS OF THE RUSSIAN
FEDERATION AND EASTERN EUROPE.”
Wikipedia
KIDNAPPING & RANSOM INSURANCE
“THE INSURANCE BUSINESS IS A GAMBLE.
INSURERS KNOW THAT SOME SHIPS WILL
BE HIJACKED, FORCING THE COMPANIES TO
DISPENSE MULTIMILLION-DOLLAR
SETTLEMENTS. HOWEVER, THEY KNOW THE
CHANCE OF THIS HAPPENING IS
MINUSCULE, WHICH BY THE CALCULATIONS
OF THEIR INDUSTRY MAKES IT WORTH
ISSUING POLICIES.”
AIG TRAVELERS HISCOX
CHUBB XL CATLIN CHARTIS
“K&R” INSURANCE CARRIERS
K&R REIMBURSEMENT
K&R INSURANCE COVERAGE
▸ Ransom Amount
▸ Transportation Costs
▸ Accidental Death or Dismemberment
▸ Legal Liability
▸ Medical Expenses
▸ Crisis Response Team
▸ Lost Wages
▸ Replacement Personnel Costs
▸ Extortionist Bounty
“ALL KIDNAPPING INSURANCE IS EITHER WRITTEN OR
REINSURED AT LLOYD’S OF LONDON. WITHIN THE LLOYD’S
MARKET, THERE ARE ABOUT 20 FIRMS (OR “SYNDICATES”)
COMPETING FOR BUSINESS. THEY ALL CONDUCT
RESOLUTIONS ACCORDING TO CLEAR RULES. THE LLOYD’S
CORP. CAN EXCLUDE ANY SYNDICATE THAT DEVIATES FROM
THE ESTABLISHED PROTOCOL AND IMPOSES COSTS ON
OTHERS. OUTSIDERS DO NOT HAVE THE NECESSARY
INFORMATION TO PRICE KIDNAPPING INSURANCE CORRECTLY.”
FINE-PRINT
HISTORY AND PROVISIONS
▸Price vary: $500 a year for $1M (USD) of liability
coverage. $50,000 for $25M (USD) in coverage.
▸Policy Confidentiality
▸Ransom is reimbursed, not paid directly
▸Customer Training
WHAT THE KIDNAPPING & RANSOM
ECONOMY TEACHES US ABOUT
RANSOMWARE?
K&R VS RANSOMWARE
SIMILARITIES
▸Sentient adversary
▸When you are a victim, you know it (unlike traditional malware)
▸Time is on the adversaries side
▸Adversaries leverage fear and anxiety
▸Bilateral monopoly (1 buyer, 1 seller)
▸Market value of the ‘asset’ is subjective and very little info
▸Victims are targeted (Not always in ransomware)
▸If adversaries break an agreement, they'll ruin the business for everyone
K&R VS RANSOMWARE
DIFFERENCES
▸Ransomware requires far less upfront costs and logistics
▸Ransomware is less risky for adversaries (attribution)
▸Ransomware hostage (the data) is not a witness
▸Ransomware scales
▸Ransomware negotiation process is way faster
▸Ransomware is easier to pay logistically (Bitcoin vs cash)
WHERE RANSOMWARE IS HEADING
RANSOMWARE TRENDS
▸Ransomware campaigns increasingly professionalized
and funded
▸Emergence of professional ransomware negotiators
▸Cyber-insurers require clients to keep ransomware
policies secret
▸Adversaries will increasingly target backup systems
RANSOMWARE
PREVENTATIVE AND RESPONSE ACTIONS
▸Backups! Test your backups! (DO NOT destroy encrypted data)
▸Fast system recovery via virtualization
▸Patch, disable MS Office macros, etc
▸Law enforcement investigate and arrest ransomware groups
▸Formation of insurance “syndicates” for ransomware pricing (ie
Lloyd’s of London)
▸Listen to your cyber-insurer (security guidance)
“IN 2010, $148 MILLION OF RANSOMS
WERE PAID TO PIRATES. ON THE OTHER
HAND, $ 1.85 BILLION DOLLARS WERE
SPENT ON INSURANCES TO COVER PIRACY,
THAT’S 10 TIMES MORE THAN THE ACTUAL
RANSOMS THAT ARE GIVEN TO PIRATES.”
Yahoo News
RANSOMWARE HAS ARRIVED
THANK YOU
Jeremiah Grossman
@jeremiahg
https://www.facebook.com/jeremiahgrossman
https://www.linkedin.com/in/grossmanjeremiah
https://www.jeremiahgrossman.com/
http://blog.jeremiahgrossman.com/

Mais conteúdo relacionado

Semelhante a What the Kidnapping & Ransom Economy Teaches Us About Ransomware

CHAPTER THIRTEEN Organized Crime in Labor, Business, and
CHAPTER THIRTEEN Organized Crime in Labor, Business, andCHAPTER THIRTEEN Organized Crime in Labor, Business, and
CHAPTER THIRTEEN Organized Crime in Labor, Business, andsimisterchristen
 
Thirteen families effectively control the central banks
Thirteen families effectively control the central banksThirteen families effectively control the central banks
Thirteen families effectively control the central banksMuro del Honor Patriotico
 
Corporate crime
Corporate crimeCorporate crime
Corporate crimelemonhusk
 
NOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdf
NOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdfNOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdf
NOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdfPrayer Warriors Institute
 
Persuasive Essay On Pro Animal Testing
Persuasive Essay On Pro Animal TestingPersuasive Essay On Pro Animal Testing
Persuasive Essay On Pro Animal TestingAmanda Dahya
 
Benarkah pemerintah lambat
Benarkah pemerintah lambatBenarkah pemerintah lambat
Benarkah pemerintah lambathenry jaya teddy
 
Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010
Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010
Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010Ranch Foods Direct
 
Corruption and Financial Crime
Corruption and Financial CrimeCorruption and Financial Crime
Corruption and Financial CrimeSam Vaknin
 
How To Write A Selfassessment Reflective E
How To Write A Selfassessment Reflective EHow To Write A Selfassessment Reflective E
How To Write A Selfassessment Reflective ESusan Matthews
 
Bloodshed: the Maturation of Systemic Fraud in the Caribbean
Bloodshed: the Maturation of Systemic Fraud in the CaribbeanBloodshed: the Maturation of Systemic Fraud in the Caribbean
Bloodshed: the Maturation of Systemic Fraud in the CaribbeanNathan Cooper
 
Understanding bitcoin
Understanding bitcoinUnderstanding bitcoin
Understanding bitcoinShuo Yang
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsTripwire
 
Panama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in HistoryPanama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in HistoryStinson
 
Pananapapersv1 160405180020
Pananapapersv1 160405180020Pananapapersv1 160405180020
Pananapapersv1 160405180020Hitesh Thakur
 
Typical Australian Essay Example Stud. Online assignment writing service.
Typical Australian Essay Example  Stud. Online assignment writing service.Typical Australian Essay Example  Stud. Online assignment writing service.
Typical Australian Essay Example Stud. Online assignment writing service.Katie Williams
 
Republic Day Quiz Competition.(2017)
Republic Day Quiz Competition.(2017)Republic Day Quiz Competition.(2017)
Republic Day Quiz Competition.(2017)Pragyan Sarma
 
Vietnamese immigration presentation wip
Vietnamese immigration presentation wipVietnamese immigration presentation wip
Vietnamese immigration presentation wipVicky Ho
 
Mobcasting The News: Crowdsourcing, Volunteers and Journalism
Mobcasting The News: Crowdsourcing, Volunteers and JournalismMobcasting The News: Crowdsourcing, Volunteers and Journalism
Mobcasting The News: Crowdsourcing, Volunteers and JournalismAndy Carvin
 

Semelhante a What the Kidnapping & Ransom Economy Teaches Us About Ransomware (20)

CHAPTER THIRTEEN Organized Crime in Labor, Business, and
CHAPTER THIRTEEN Organized Crime in Labor, Business, andCHAPTER THIRTEEN Organized Crime in Labor, Business, and
CHAPTER THIRTEEN Organized Crime in Labor, Business, and
 
Thirteen families effectively control the central banks
Thirteen families effectively control the central banksThirteen families effectively control the central banks
Thirteen families effectively control the central banks
 
Corporate crime
Corporate crimeCorporate crime
Corporate crime
 
The Panama Papers Hack
The Panama Papers HackThe Panama Papers Hack
The Panama Papers Hack
 
NOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdf
NOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdfNOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdf
NOVEMBER 9, 2022 NYC PLANNED NUCLEAR ATTACK FOR INDUCE REGIONAL KILLER C.pdf
 
Persuasive Essay On Pro Animal Testing
Persuasive Essay On Pro Animal TestingPersuasive Essay On Pro Animal Testing
Persuasive Essay On Pro Animal Testing
 
Benarkah pemerintah lambat
Benarkah pemerintah lambatBenarkah pemerintah lambat
Benarkah pemerintah lambat
 
Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010
Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010
Idependent Cattlemen of Nebraska (ICON) Annual Meeting 2010
 
Corruption and Financial Crime
Corruption and Financial CrimeCorruption and Financial Crime
Corruption and Financial Crime
 
Killdeer Packet
Killdeer PacketKilldeer Packet
Killdeer Packet
 
How To Write A Selfassessment Reflective E
How To Write A Selfassessment Reflective EHow To Write A Selfassessment Reflective E
How To Write A Selfassessment Reflective E
 
Bloodshed: the Maturation of Systemic Fraud in the Caribbean
Bloodshed: the Maturation of Systemic Fraud in the CaribbeanBloodshed: the Maturation of Systemic Fraud in the Caribbean
Bloodshed: the Maturation of Systemic Fraud in the Caribbean
 
Understanding bitcoin
Understanding bitcoinUnderstanding bitcoin
Understanding bitcoin
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Panama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in HistoryPanama Papers - The Biggest Financial Leak in History
Panama Papers - The Biggest Financial Leak in History
 
Pananapapersv1 160405180020
Pananapapersv1 160405180020Pananapapersv1 160405180020
Pananapapersv1 160405180020
 
Typical Australian Essay Example Stud. Online assignment writing service.
Typical Australian Essay Example  Stud. Online assignment writing service.Typical Australian Essay Example  Stud. Online assignment writing service.
Typical Australian Essay Example Stud. Online assignment writing service.
 
Republic Day Quiz Competition.(2017)
Republic Day Quiz Competition.(2017)Republic Day Quiz Competition.(2017)
Republic Day Quiz Competition.(2017)
 
Vietnamese immigration presentation wip
Vietnamese immigration presentation wipVietnamese immigration presentation wip
Vietnamese immigration presentation wip
 
Mobcasting The News: Crowdsourcing, Volunteers and Journalism
Mobcasting The News: Crowdsourcing, Volunteers and JournalismMobcasting The News: Crowdsourcing, Volunteers and Journalism
Mobcasting The News: Crowdsourcing, Volunteers and Journalism
 

Mais de Jeremiah Grossman

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterJeremiah Grossman
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorJeremiah Grossman
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryJeremiah Grossman
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideJeremiah Grossman
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Jeremiah Grossman
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Jeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage YearsJeremiah Grossman
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Jeremiah Grossman
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015Jeremiah Grossman
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesJeremiah Grossman
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedJeremiah Grossman
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportJeremiah Grossman
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)Jeremiah Grossman
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Jeremiah Grossman
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]Jeremiah Grossman
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Jeremiah Grossman
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Jeremiah Grossman
 

Mais de Jeremiah Grossman (20)

All these vulnerabilities, rarely matter
All these vulnerabilities, rarely matterAll these vulnerabilities, rarely matter
All these vulnerabilities, rarely matter
 
How to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare SectorHow to Determine Your Attack Surface in the Healthcare Sector
How to Determine Your Attack Surface in the Healthcare Sector
 
The Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare IndustryThe Attack Surface of the Healthcare Industry
The Attack Surface of the Healthcare Industry
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?Can Ransomware Ever Be Defeated?
Can Ransomware Ever Be Defeated?
 
Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016Web Application Security Statistics Report 2016
Web Application Security Statistics Report 2016
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years15 Years of Web Security: The Rebellious Teenage Years
15 Years of Web Security: The Rebellious Teenage Years
 
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
Where Flow Charts Don’t Go -- Website Security Statistics Report (2015)
 
WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015WhiteHat’s Website Security Statistics Report 2015
WhiteHat’s Website Security Statistics Report 2015
 
No More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security GuaranteesNo More Snake Oil: Why InfoSec Needs Security Guarantees
No More Snake Oil: Why InfoSec Needs Security Guarantees
 
WhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report ExplainedWhiteHat Security 2014 Statistics Report Explained
WhiteHat Security 2014 Statistics Report Explained
 
WhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics ReportWhiteHat 2014 Website Security Statistics Report
WhiteHat 2014 Website Security Statistics Report
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)WhiteHat Security Website Statistics [Full Report] (2013)
WhiteHat Security Website Statistics [Full Report] (2013)
 
Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012Top Ten Web Hacking Techniques of 2012
Top Ten Web Hacking Techniques of 2012
 
WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]WhiteHat’s 12th Website Security Statistics [Full Report]
WhiteHat’s 12th Website Security Statistics [Full Report]
 
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
Web Breaches in 2011-“This is Becoming Hourly News and Totally Ridiculous"
 
Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)Top Ten Web Hacking Techniques (2010)
Top Ten Web Hacking Techniques (2010)
 

Último

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 

Último (20)

Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 

What the Kidnapping & Ransom Economy Teaches Us About Ransomware

  • 1. WHAT THE KIDNAPPING & RANSOM ECONOMY TEACHES US ABOUT RANSOMWARE JEREMIAH GROSSMAN CHIEF OF SECURITY STRATEGY @jeremiahg https://www.jeremiahgrossman.com/ http://blog.jeremiahgrossman.com/ http://sentinelone.com/
  • 2. BIO WHO I AM… ▸Professional Hacker ▸Black Belt in Brazilian Jiu-Jitsu ▸Founder of WhiteHat Security
  • 3.
  • 4. MY FIRST ‘PERSONAL’ EXPERIENCE WITH CYBER-EXTORTION 2005
  • 5. “THE FBI RECENTLY PUBLISHED THAT RANSOMWARE VICTIMS PAID OUT $209 MILLION IN Q1 2016 COMPARED TO $24 MILLION FOR ALL OF 2015.” LA Times THE BIRTH OF A BILLION DOLLAR CYBER-CRIME INDUSTRY JUST OVER 10 YEARS LATER…
  • 6. DEC 11, 1989: 20,000 ENVELOPES CONTAINING 5 1/4" FLOPPY DISKS LOADED W/ THE FIRST KNOWN RANSOMWARE (‘AIDS') WERE MAILED.
  • 7.
  • 8.
  • 9. MEDICAL CARE TRANSPORTATION GOVERNMENT EDUCATION POLICE IOT SECURITY PEOPLE HOTELS
  • 10. “FAMILY MEMBER'S TV IS BRICKED BY ANDROID MALWARE. #LG WONT DISCLOSE FACTORY RESET. AVOID THESE "SMART TVS" LIKE THE PLAGUE.” TWITTER INTERNET OF THINGS
  • 11. “A 'RANSOMWARE' PROGRAM HAD INFECTED HIS COMPUTER ALLOWING THE HACKERS TO FILM HIM THROUGH THE WEBCAM. HE HAD BEEN FILMED IN A COMPROMISING SITUATION. NOW THEY WANTED MONEY.” ABC AU PEOPLE
  • 12. “ONE OF EUROPE'S TOP HOTELS HAS ADMITTED THEY HAD TO PAY THOUSANDS IN BITCOIN RANSOM TO CYBERCRIMINALS WHO MANAGED TO HACK THEIR ELECTRONIC KEY SYSTEM, LOCKING HUNDREDS OF GUESTS OUT OF THEIR ROOMS UNTIL THE MONEY WAS PAID.” The Local HOTELS
  • 13. “A RANSOMWARE ATTACK TOOK TICKET MACHINES FOR SAN FRANCISCO'S LIGHT RAIL TRANSIT SYSTEM OFFLINE ALL DAY SATURDAY DURING ONE OF THE BUSIEST SHOPPING WEEKENDS OF THE YEAR, BUT RATHER THAN SHUTTING DOWN, THE AGENCY DECIDED INSTEAD TO LET USERS RIDE FOR FREE.” USA TODAY TRANSPORTATION
  • 14. “CRIMINALS INFECTED 70 PERCENT OF STORAGE DEVICES TIED TO CLOSED- CIRCUIT TVS IN WASHINGTON DC EIGHT DAYS BEFORE THE INAUGURATION OF PRESIDENT DONALD TRUMP.” The Register EVENT SECURITY
  • 15. “THE ATTACK FORCED DEPARTMENTS SUCH AS THE LICKING COUNTY 911 CENTER, COUNTY AUDITOR'S OFFICE AND CLERK OF COURTS TO PERFORM THEIR JOBS WITHOUT THE USE OF COMPUTERS OR OFFICE TELEPHONES.” Newark Advocate EMERGENCY SERVICES
  • 16. “LOST DATA GOES BACK TO 2009. DATA FROM THAT PERIOD BACKED UP ON DVDS AND CDS REMAINED INTACT. WHILE ARCHIVED DATA HAS ITS IMPORTANCE, MORE WORRYING IS THAT THE DEPARTMENT LOST DATA FROM ONGOING INVESTIGATIONS.” Bleeping Computer LAW ENFORCEMENT
  • 17. “THE TRUST DID NOT PAY ANY RANSOM AS A RESULT OF THE ATTACK BUT IT DID HAVE TO CANCEL 2,800 PATIENT APPOINTMENTS DURING 48 HOURS WHEN IT SHUT DOWN SYSTEMS.” The Telegraph MEDICAL CARE
  • 18. INDUSTRY REPORTS, DATA, AND ANECDOTES
  • 19. IBM SECURITY’S X-FORCE 70% OF ENTERPRISE RANSOMWARE VICTIMS PAID UP. 20% OF COMPROMISED ORGANIZATIONS PAID RANSOMS OF MORE THAN $40,000 (USD). 25% HAVE PAID BETWEEN $20,000 (USD) AND $40,000 (USD). (DEC, 2016)
  • 20. SENTINELONE OVER THE PAST 12 MONTHS, 50% OF ORGANIZATIONS HAVE RESPONDED TO A RANSOMWARE CAMPAIGN. THOSE ORGANIZATIONS THAT SUFFERED A RANSOMWARE ATTACK IN THE PAST 12 MONTHS, 85% STATED THAT THEY WERE HIT WITH THREE OR MORE ATTACKS. (NOV, 2016)
  • 21. KASPERSKY LAB THE NUMBER OF RANSOMWARE INFECTIONS SUFFERED BY COMPANIES UP 3-FOLD FROM JANUARY TO SEPTEMBER. 1-IN-5 BUSINESSES WORLDWIDE HAS BEEN VICTIMS OF A RANSOMWARE AND THE RATE OF RANSOMWARE ATTACKS INCREASED FROM ONE EVERY 2-MIN TO ONE EVERY 40-SEC. (DEC, 2016)
  • 23.
  • 24. THE RANSOMWARE LANDSCAPE ▸Not all critical systems are backed-up ▸Your Anti-Virus software SUCKS ▸Infection rates rising fast (still) ▸Rising ransom demands ▸CFOs - or their law firms - must learn how to transact in Bitcoin ▸Innovation in business models, victim targeting, and malware ▸Cyber-Insurance reimbursement
  • 25. KIDNAPPING & RANSOM “K&R” REPORTEDLY A $500 MILLION (USD) MARKET
  • 26.
  • 27. ”IN 75 BCE, 25-YEAR-OLD JULIUS CAESAR WAS SAILING THE AEGEAN SEA WHEN HE WAS KIDNAPPED BY CILICIAN PIRATES. WHEN THE PIRATES ASKED FOR A RANSOM OF 20 TALENTS OF SILVER, CAESAR LAUGHED AT THEIR FACES. THEY DIDN'T KNOW WHO THEY HAD CAPTURED, HE SAID, AND DEMANDED THAT THEY ASK FOR 50 (1550 KG OF SILVER), BECAUSE 20 TALENTS WAS SIMPLY NOT ENOUGH.”
  • 28. “ON OCT 22, THE FAMILY OF BILLIONAIRE PEARL ORIENTAL OIL CHAIRMAN WONG YUK-KWAN PAID TAIWANESE KIDNAPPERS $1.68 MILLION (USD) IN BITCOIN AFTER THEY THREATENED TO “DIG OUT THE EYEBALLS OR CHOP OFF THE LEGS” OF YUK-KWAN.”
  • 29. "MOST OF SOMALIA'S MODERN-DAY PIRATES ARE FISHERMEN WHO TRADED NETS FOR GUNS. THEY'VE LEARNED THAT RANSOM IS MORE PROFITABLE THAN ROBBERY, AND RATHER THAN SQUANDERING THEIR LOOT, THEY REINVEST IN EQUIPMENT AND TRAINING."
  • 30. “AN ORDINARY SOMALI EARNS ABOUT $600 (USD) A YEAR, BUT EVEN THE LOWLIEST FREEBOOTER CAN MAKE NEARLY 17 TIMES THAT — $10,000 (USD) — IN A SINGLE HIJACKING. NEVER MIND THE RISK; IT'S LESS DANGEROUS THAN LIVING IN WAR- TORN MOGADISHU.”
  • 31. “FEWER THAN 1-IN-3 HIJACK ATTEMPTS IS SUCCESSFUL. A SAVVY CAPTAIN CAN WARD OFF MARAUDERS BY MANEUVERING THE SHIP TO CREATE A TURBULENT WAKE WHILE CALLING FOR HELP. IF THE ATTACKERS DON'T BOARD WITHIN 15-MIN, A NEARBY NAVAL SHIP MIGHT SEND A HELICOPTER GUNSHIP. ONCE THE PIRATES CONTROL THE VESSEL, THOUGH, IT'S GAME OVER: LIKE CONVENIENCE- STORE CLERKS, CREWS ARE TRAINED NOT TO RESIST.”
  • 32. HIGH SEAS PIRACY PIRACY MISSION SET-UP & COSTS ▸$50K-$250K (USD) in seed capital ▸Crew of 12-24 men (varied skills) ▸Speed boats, larger ship to launch boats, caterer, ladders, ropes, intelligence, weapons, communications, etc ▸Select targets by the cargo, owner, and port of origin ▸“Trustworthy” financial system for money-laundering
  • 33. DIVISION OF LABOR BACK OFFICE LOGISTICS ▸Tribe Elders: Liaisons with the outside world. ▸Financiers: Capital comes from local businessmen as well as the Islamist militant group. ▸Commander: Marshal resources, recruits crew, and organizes operations. ▸Security Squad: Protects the commander, ferries supplies and backs up attackers. ▸Mother Ship Crew Attack Squad: Extends the marauders' reach hundreds of miles out to sea; Carries attack squad made up of fishermen. ▸Negotiators: English speaking; Point of contact for the hostage takers.
  • 34. IT’S JUST BUSINESS NEGOTIATION PROCESS ▸May take days, weeks, months — sometimes years ▸Negotiations by professional K&R consultants (ex- military, law enforcement, or intelligence) ▸No “supernormal profits.” "Pirates routinely demand far more than they expect to receive. For catches with valuable cargo, bargaining can open at 10 times the previously highest settlement. The limiting factor is time: With each passing day, chances increase that a hostage will die or the ship will become damaged, and the likelihood of a peaceful resolution — and a fat bag of cash — dwindles."
  • 35. “ONE NEW TECHNIQUE IS TO AIRDROP THE MONEY. A MILLION DOLLARS IN $100 NOTES WEIGHS ABOUT 29 POUNDS. IT IS PLACED INTO A CONTAINER LIKE AN INFLATABLE BALL AND DROPPED OUT OF AN AIRPLANE USING A PARACHUTE GUIDED BY A GLOBAL POSITIONING SYSTEM.”
  • 36. GETTING PAID DIVVYING UP THE BOOTY ▸Reimbursement of supplier(s) ▸Financiers: 30-70% of the ransom ▸Elders: 5-10 %of the ransom (anchoring rights) ▸Crew: Remaining sum divided up by shares “ Gullestrup's ship and crew were returned safely, although the pirates didn't actually want to get off the ship right away. That's because they were afraid of getting robbed by other pirates on their way back to shore, Gullestrup says, so he gave them a ride north, dropping them closer to home.”
  • 37. PREVENTION AND RESPONSE HIGH-SEAS PIRACY PREVENTION ▸Armed private security guards on board ships ▸Shippers harden vessels or take evasive action ▸A change in Somalia at national and local level ▸Pre-emptive action by combined navies in the region ▸Britney Spears “It lasted just a few minutes, with a helicopter crew launching from a ship just offshore and raking beached and unmanned pirate speedboats - known as "skiffs" - with machine-gun fire. Fuel stores and other equipment were also fired on, but EU Navfor says there were no casualties on either side and there were no European "boots on the ground".
  • 38. “HER SONGS WERE CHOSEN BY THE SECURITY TEAM BECAUSE THEY THOUGHT THE PIRATES WOULD HATE THEM MOST. THESE GUYS CAN'T STAND WESTERN CULTURE OR MUSIC, MAKING BRITNEY'S HITS PERFECT. AS SOON AS THE PIRATES GET A BLAST OF BRITNEY, THEY MOVE ON AS QUICKLY AS THEY CAN." NBC News LAW ENFORCEMENT
  • 39. KIDNAPPING & RANSOM INSURANCE ORIGINATED FOLLOWING THE KIDNAPPING OF CHARLES LINDBERGH’S BABY IN 1932. THE BOOST IN POLICIES BEGAN IN THE LATE 70’S.
  • 40. “K&R INSURANCE IS DESIGNED TO PROTECT INDIVIDUALS AND CORPORATIONS OPERATING IN HIGH-RISK AREAS AROUND THE WORLD. LOCATIONS MOST OFTEN NAMED IN POLICIES INCLUDE MEXICO, VENEZUELA, HAITI, AND NIGERIA, CERTAIN OTHER COUNTRIES IN LATIN AMERICA, AS WELL AS SOME PARTS OF THE RUSSIAN FEDERATION AND EASTERN EUROPE.” Wikipedia KIDNAPPING & RANSOM INSURANCE
  • 41. “THE INSURANCE BUSINESS IS A GAMBLE. INSURERS KNOW THAT SOME SHIPS WILL BE HIJACKED, FORCING THE COMPANIES TO DISPENSE MULTIMILLION-DOLLAR SETTLEMENTS. HOWEVER, THEY KNOW THE CHANCE OF THIS HAPPENING IS MINUSCULE, WHICH BY THE CALCULATIONS OF THEIR INDUSTRY MAKES IT WORTH ISSUING POLICIES.”
  • 42. AIG TRAVELERS HISCOX CHUBB XL CATLIN CHARTIS “K&R” INSURANCE CARRIERS
  • 43. K&R REIMBURSEMENT K&R INSURANCE COVERAGE ▸ Ransom Amount ▸ Transportation Costs ▸ Accidental Death or Dismemberment ▸ Legal Liability ▸ Medical Expenses ▸ Crisis Response Team ▸ Lost Wages ▸ Replacement Personnel Costs ▸ Extortionist Bounty
  • 44. “ALL KIDNAPPING INSURANCE IS EITHER WRITTEN OR REINSURED AT LLOYD’S OF LONDON. WITHIN THE LLOYD’S MARKET, THERE ARE ABOUT 20 FIRMS (OR “SYNDICATES”) COMPETING FOR BUSINESS. THEY ALL CONDUCT RESOLUTIONS ACCORDING TO CLEAR RULES. THE LLOYD’S CORP. CAN EXCLUDE ANY SYNDICATE THAT DEVIATES FROM THE ESTABLISHED PROTOCOL AND IMPOSES COSTS ON OTHERS. OUTSIDERS DO NOT HAVE THE NECESSARY INFORMATION TO PRICE KIDNAPPING INSURANCE CORRECTLY.”
  • 45. FINE-PRINT HISTORY AND PROVISIONS ▸Price vary: $500 a year for $1M (USD) of liability coverage. $50,000 for $25M (USD) in coverage. ▸Policy Confidentiality ▸Ransom is reimbursed, not paid directly ▸Customer Training
  • 46. WHAT THE KIDNAPPING & RANSOM ECONOMY TEACHES US ABOUT RANSOMWARE?
  • 47. K&R VS RANSOMWARE SIMILARITIES ▸Sentient adversary ▸When you are a victim, you know it (unlike traditional malware) ▸Time is on the adversaries side ▸Adversaries leverage fear and anxiety ▸Bilateral monopoly (1 buyer, 1 seller) ▸Market value of the ‘asset’ is subjective and very little info ▸Victims are targeted (Not always in ransomware) ▸If adversaries break an agreement, they'll ruin the business for everyone
  • 48. K&R VS RANSOMWARE DIFFERENCES ▸Ransomware requires far less upfront costs and logistics ▸Ransomware is less risky for adversaries (attribution) ▸Ransomware hostage (the data) is not a witness ▸Ransomware scales ▸Ransomware negotiation process is way faster ▸Ransomware is easier to pay logistically (Bitcoin vs cash)
  • 49. WHERE RANSOMWARE IS HEADING RANSOMWARE TRENDS ▸Ransomware campaigns increasingly professionalized and funded ▸Emergence of professional ransomware negotiators ▸Cyber-insurers require clients to keep ransomware policies secret ▸Adversaries will increasingly target backup systems
  • 50. RANSOMWARE PREVENTATIVE AND RESPONSE ACTIONS ▸Backups! Test your backups! (DO NOT destroy encrypted data) ▸Fast system recovery via virtualization ▸Patch, disable MS Office macros, etc ▸Law enforcement investigate and arrest ransomware groups ▸Formation of insurance “syndicates” for ransomware pricing (ie Lloyd’s of London) ▸Listen to your cyber-insurer (security guidance)
  • 51. “IN 2010, $148 MILLION OF RANSOMS WERE PAID TO PIRATES. ON THE OTHER HAND, $ 1.85 BILLION DOLLARS WERE SPENT ON INSURANCES TO COVER PIRACY, THAT’S 10 TIMES MORE THAN THE ACTUAL RANSOMS THAT ARE GIVEN TO PIRATES.” Yahoo News RANSOMWARE HAS ARRIVED