Security experts share 3 key insights on ransomware

Year 2017 has arrived before people even realized it was coming and it’s brought with it an army of new buzzwords, fresh security threats and an even more switched-on world than 2016.

Before people entangle themselves in everything digital that this year has to offer, it’s important to heed expert advice. Take ransomware – what does it really entail and will it vanish as quickly as it appeared? One thing’s for sure: Ransomware isn’t going anywhere. As recently reported, cybercrime has wriggled its way into 21st century life, wreaking a trail of havoc as it goes. Ransomware is attacking our hospitals, our libraries and our financial institutions. It’s attacking the trendy new connected cars. As ESET’s Stephen Cobb envisions, what if it sets its sights on Internet of Things (IoT) devices?

Here are three key insights on ransomware shared by ESET experts, Stephen Cobb, David Harley and Lysa Myers:

RoT: Ransomware of Things

Stephen Cobb, senior security researcher at ESET, shares the following:

Golden rule: Don’t put anything on the internet you wouldn’t want your mother to see.

Cobb warns of the impact of a yet unknown concept. His concern is that “malicious software that seeks to take control of a device” — or “jackware”, as he calls it — may infiltrate 2017.

During midwinter in 2016 in Finland, where temperatures were below freezing, cybercriminals were able to take control and halt the heating of two buildings during a distributed denial of service attack. Could these attacks become commonplace as the IoT continues to flourish?

Cobb believes there needs to be a collective international effort made, on both a technical and political level, to stop the IoT giving way to the RoT. “Traditional security techniques like filtering, encrypting, and authenticating can consume costly processing power and bandwidth,” he pointed out. “There has been a collective international failure to prevent a thriving criminal infrastructure evolving in cyberspace.”

The good news is people are not falling for anything they are not sure about. Cobb cites a report from a survey showing that more than 40% of American adults remain unconvinced that IoT devices are safe.

He questions: “Could the combination of consumer sentiment and government guidance lead companies to make the IoT more resistant to abuse?”

Ransomware: should you pay up?

David Harley, senior research fellow at ESET, has this to say:

Golden rule: Skepticism is a survival trait: don’t assume that anything you read online is gospel truth, even in this adage.

To pay (cybercriminals demanding a bitcoin ransom), or not to pay, that is the question.

Such is the current state of the modern world.

On the morality of paying a ransom to cybercriminals who’ve attacked your system and encrypted your data, there’s a multitude of opinions around. “There’s an undeniable argument that if you give in and pay the ransom, you’ve directly contributed to the wellbeing of criminality,” concedes David Harley. “And there’s unlikely to be a money-back guarantee.”

However, he recognizes that often it’s not that straightforward: “In many cases, it’s cheaper to pay up than lose the data … Maybe the damage is so severe that you go out of business. You can’t blame companies if they decide to pay up rather than commit financial suicide.

“It might be seen as being more responsible to pay up rather than destroy the livelihoods of all staff.”

His own personal advice is that “prevention (and backup) is worth a ton of Bitcoins”.

Whatever your stance on the issue, the solution remains to follow the advice of experts such as Harley himself, and Lysa Myers.

What can you do about ransomware?

Lysa Myers, security researcher at ESET, notes the following:

Golden rule: An ounce of prevention is worth a pound of cure.

“If you have properly prepared your system,” says Myers, “[ransomware] is really nothing more than a nuisance.”

ESET selected five precautions Myers has advised taking, by means of the aforementioned prevention.

1. Back up your data — on an external drive that is disconnected from your devices and network when not in use

  • This is the single most important thing you can do.

2. Keep your software up to date

  • Use reputable software repositories for both anti-malware software and a software firewall.

3. Disable macros in Microsoft Office files

  • By doing so, you deactivate the use of the scripting language used by malware.

4. Display hidden file extensions — and look for double extensions

  • Windows and OSX hide known file extensions. Malware takes advantage of this.

5. Filter EXE files in email; and disable RDP and files running from AppData / LocalAppData folders

  • Behaviour used by ransomware often manifests itself in the above.