Ransomware

Refers to extortionate malicious programs. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is composed of the words ‘ransom’ and ‘ware,’ which is derived from ‘software,’ meaning program.

 

What does ransomware mean in detail?

Ransomware attacks are currently on the rise. Cybercriminals have identified companies, public authorities and administrations as lucrative targets. Increasingly, sophisticated, customised attacks on companies are being observed. Cybercriminals proceed in a targeted and often multi-stage manner. They gain access to the company network using seemingly everyday cyber incidents such as spam. They then explore the IT infrastructure to encrypt particularly important or sensitive data – or the entire system, including connected backups. This approach allows the blackmailers to exert greater pressure on the affected companies and demand higher ransoms. For cybercriminals, payment of the ransom is the desired end point of their activities.

Whether they release the encrypted data or systems afterwards is therefore always uncertain. Some ransomware programmes do not provide for decryption, meaning that the data remains encrypted even after the ransom has been paid.

In the case of the well-known WannaCry ransomware, ransom payments could not be traced due to a programming error. As a result, the data was not decrypted.

A second, higher ransom demand may also be part of the cybercriminals‘ plan.

Technically speaking, ransomware is a type of Trojan. Ransomware can be transmitted in several ways, including via infected email attachments, compromised websites, infected USB sticks and hard drives, security vulnerabilities in the network and so-called drive-by downloads.

 

Where do I encounter ransomware in my everyday work?

You may potentially encounter it in every email with an attachment, in every email with a link, and in many other places in your everyday work. For example, in seemingly lost or forgotten USB sticks, when transferring data to external hard drives from customers, when downloading a supposedly important update to watch a video on the Internet. In all these situations, you can protect your company from serious damage by exercising caution.

 

What can I do to improve my security?

This glossary can only provide suggestions and insights. Please discuss and develop a comprehensive approach with your IT department or an external IT security service provider such as Perseus.

Preventive

Almost all measures to reduce your company’s cyber risk also reduce the risk of ransomware attacks. These measures include, among others:

  • Always keep all programmes and components of the network up to date, e.g. through automatic updates
  • Use a reliable virus scanner that is always kept up to date
  • Careful use of a reliable firewall
  • A well-designed network structure in which, for example, particularly sensitive areas or departments are given an independent network
  • Monitoring of data traffic
  • Raising awareness among your employees: Through their attentiveness and caution, your employees can avert damage even where technology cannot. For example, they can recognise and treat an email containing a previously unknown Trojan as suspicious.
  • When considering security measures, also take into account so-called shadow IT (e.g. employees‘ privately used smartphones) and IoT devices (e.g. fitness trackers, digital surveillance cameras).
  • A well-thought-out backup strategy is also recommended. This ensures that you can recover as much of your data as possible, even in the worst-case scenario. With regard to ransomware, you should consider the following, among other things:
    • Backups connected to the system can also be encrypted by ransomware. We therefore recommend frequent backups, which should be physically disconnected from the system after creation.
    • Ransomware that is not yet active can also be stored on your backup and encrypt it after it has been imported. Therefore, make sure that as many previous backups as possible are stored. Also ensure that they are stored in ‘read-only’ mode. Then these backups cannot be changed afterwards, even by ransomware. Discuss the correct procedure in an emergency with your IT department or an external IT security service provider such as Perseus.
    • Practice it – with your employees too – and put it in writing. In an emergency, a quick and correct response is crucial. You can create the best conditions for this in advance.

 

After a seemingly ‘normal’ cyber incident

  • Have your system checked very carefully for deeper compromises and arrange for particularly close monitoring of incoming and outgoing data traffic.
  • If you have not already done so, discuss the topic of ransomware and security measures with your IT department and/or an external IT security service provider such as Perseus now at the latest.

 

In an emergency

ATTENTION: These instructions are general. In an emergency, follow the procedure discussed with your IT department or an external IT security service provider such as Perseus. Only this procedure is tailored to your company’s individual IT infrastructure!

  • Disconnect the affected device or system from the network, the Internet and, if possible, from the power supply as quickly as possible. With luck, you will be able to stop the encryption process before it is completed. Do not be misled, even by messages to the contrary on the screen of an infected computer.
  • Not all devices can be disconnected from the power supply, e.g. laptops or tablets with built-in batteries. If possible, remove these. If not, shut down the device as quickly as possible.
  • Alert experts for further action.
  • Backups are usually created from the infected systems. This serves as digital evidence and also allows many encrypted data files to be restored.
  • Report this cyber incident to the police, the BKA and the Cyber Security Reporting Centre in Germany. By doing so, you can help ensure that the perpetrators are caught and other companies are warned.
  • Do not pay any ransom. There is no guarantee that your device or system will be decrypted afterwards; in some cases, this option is not even provided for in the ransomware programme. There is even a possibility that you will be confronted with a second ransom demand after payment. Furthermore, it is possible that the cybercriminals will compromise the payment method and means of payment and thus obtain sensitive credit card information, for example.

 

Further information and tips for emergencies from the police crime prevention service: https://www.polizei-beratung.de/themen-und-tipps/gefahren-im-internet/ransomware/