07.04.2017 Views

RiskUKApril2017

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Ransomware is a<br />

constantly growing<br />

threat and a highly<br />

effective one.<br />

Osterman research<br />

from 2016 found that<br />

ransomware was used<br />

to target 54% of UK<br />

organisations, with<br />

more than half paying<br />

the ransom. Of those<br />

who didn’t pay, nearly<br />

a third ended up<br />

losing their data.<br />

Wieland Age looks at<br />

why defeating<br />

ransomware is so<br />

important in today’s<br />

education sector<br />

An Education on Ransomware<br />

Last year, Locky spawned a file-encrypting<br />

epidemic. Since then, it has become the<br />

most prevalent ransomware on the planet.<br />

Targeting universities among many other large<br />

institutions, its continuous, pitch-perfect<br />

campaigns demonstrate how organised crime is<br />

digitising faster and more successfully than<br />

many ‘legitimate’ enterprises.<br />

This emergence of Locky, which represents a<br />

new strain of ransomware, demonstrates just<br />

how successful cyber criminals are becoming at<br />

mastering the digital transformation agenda.<br />

Locky’s creators invested significant time and<br />

resources in product development, identifying<br />

the best user interface, performance and<br />

encryption security protocols. So much so, in<br />

fact, that the FBI actually recommended victims<br />

pay any demanded ransom in order to gain the<br />

correct decryption code.<br />

To support their programme, the criminals<br />

even created a ‘Customer Help Centre’ to<br />

handle sales and support. If victims have<br />

problems decrypting their data, online ‘staff’<br />

are on-hand via chat rooms to walk ‘customers’<br />

through the process. This ensures that there<br />

are no negative social media reports from<br />

victims who, having paid up, are then unable to<br />

regain access to their data files.<br />

When it comes to propagating Locky, the<br />

online criminals have done their homework. In<br />

December, their latest phishing campaign<br />

reached millions of victims in over 100<br />

countries within days. Most start-ups would be<br />

overwhelmed by such success, but the<br />

distributors of Locky have created a highly<br />

mature online infrastructure designed to<br />

manage high volumes of payments and<br />

enquiries – in multiple languages – from the<br />

victims whom they target.<br />

Education: an unlikely target?<br />

IT professionals operating in educational<br />

institutions have been slow to adopt<br />

ransomware defences, perhaps because there<br />

has been an unfounded misconception that<br />

they’re unlikely to be targeted. If that used to<br />

be the case, it’s certainly not true any more.<br />

Bournemouth University was hit by no less than<br />

21 ransomware attacks last year, while Los<br />

Angeles College was recently forced to pay a<br />

$28,000 ransom to unlock critical data and<br />

systems following a ransomware attack. It’s<br />

shocking, but not altogether uncommon. In<br />

many ways, educational establishments are a<br />

logical target for malicious attackers.<br />

With whole campuses full of independent,<br />

computer-based study being carried out by<br />

students, these younger users could be<br />

perceived to be less wary of suspicious e-mails,<br />

attachments and websites. Compound this with<br />

the fact that each one of these thousands of<br />

pupils likely has multiple devices, all connected<br />

to the institution’s network, and it’s easy to see<br />

how hackers might view schools, colleges and<br />

universities as low hanging fruit. Millions of<br />

highly sensitive records, treasured works and<br />

confidential details, combined with a very real<br />

need to aintain their reputations as trusted<br />

organisations, mean that educational<br />

institutions are seen by many as easy pickings.<br />

Education sector IT budgets don’t normally<br />

include blank cheques for combating cyber<br />

criminals, so investing in anti-ransomware<br />

measures should be a priority for any<br />

educational organisation wanting to avoid a<br />

nasty and expensive surprise.<br />

Fortunately, it’s possible to halt digital<br />

attacks with a combination of the right security<br />

measures and user awareness.<br />

Raising awareness<br />

Most ransomware attacks begin with an e-mail<br />

containing malicious links or attachments.<br />

Consequently, to reduce the likelihood of a<br />

successful attack, it’s imperative to ensure staff<br />

and students know all about the dangers of<br />

ransomware, understand how to practise safe<br />

computing and can recognise the indicators of<br />

malicious e-mails. It’s also important to<br />

maintain awareness by implementing a<br />

programme of regular reminders.<br />

30<br />

www.risk-uk.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!