Site icon Finance Derivative

Netflix-style ransomware makes your organisation’s data the prize in a dark subscription economy

By John Davis, UK & Ireland Director, SANS Institute.

Today’s subscription economy makes accessing nearly any service as easy as hitting enter. The same model has now entered the dark web. The same Netflix-style instant-access menu is now part and parcel of the online criminal’s lifestyle. Ransomware-as-a-Service (Raas) is opening up the hacking talent pool, giving amateurs access to sophisticated ransomware toolkits – a plug and play option that has seen hackers run rampant.

Once ad hoc acts were committed by hackers using simple phishing attacks to gain entry. They have now become complex and targeted, using the latest purchasable ‘toolkits’ allowing any dark actor to get a slice of the ransomware pie by simply subscribing to a ransomware toolkit.

A growing proportion of ransomware attacks are being carried out using the RaaS model and it is clear that the toolkit creators and their customers are cashing in. So, what can organisations do to ensure they aren’t victims of these cookie-cutter attacks?

Sophisticated criminal service providers

RaaS providers sell their services using sophisticated business and marketing strategies to appeal to hackers wanting maximum return for minimal effort. These providers operate in the grey zone between legal and illegal, marketing themselves on the dark web; they appeal to criminal clients interested in purchasing a single attack or even maintaining a retainer-style relationship for ongoing attacks. The client can pay a monthly fee for advice and assistance, usually in cryptocurrency. Like the best subscription providers, this can even include around-the-clock support that covers technical aspects of an attack and matters such as negotiations with a victim. The client also may share a portion of any payment extracted from a victim with the RaaS provider.

John Davis

The RaaS model makes attribution of attack difficult but not impossible. In some cases, there are elements, such as snippets of malicious code, that can help authorities trace an attack back to a perpetrator known to be running a RaaS operation, and attackers, when caught, may give up relevant details.

RaaS providers sell expertise and prefer keeping the client at arm’s length to avoid detection and prosecution. Indeed, it can be harder to prosecute RaaS than conventional ransomware attacks because there are more moving parts, and they may move in several jurisdictions governed by competing laws and authorities. The advent of RaaS and ransomware, generally, have increased the impetus to harmonise laws and foster law enforcement cooperation in this area.

Cloud gives and takes

RaaS providers are taking advantage of IaaS (Infrastructre-as-a-Service) and the economics of cloud-based computing and storage the same way legitimate businesses do. The participation of most IaaS companies is usually unintentional. The desire to maintain their clients’ data security and their own reputations makes legitimate IaaS providers a formidable ally in the war against ransomware and RaaS providers.

Just as in legal, and commercial undertakings, ransomware skills are continually honed, and standards are elevated through competition. As RaaS providers raise their game, the stakes for potential targets are also raised. The threats they face will be more acute, at least until cybersecurity professionals and law enforcement raise their game and improve their methods for combating threats. Similarly, organisations that find themselves on the wrong end of an attack are not helpless.

Resisting the rise of RaaS

As the risk of RaaS attacks increases The Centre for Internet Security has shared a series of Critical Security Controls that should go a long way to fending off RaaS and other types of ransomware attacks and to mitigating damage should one occur. These include:

Continual proactive protection

The RaaS model only increases the likelihood of an attack, making it a feasible option to a broader population of bad actors. There is now no choice but to take proactive steps to protect against this genuine threat, continually evaluating the threat backdrop and monitoring systems and people. When it comes to a potentially business-breaking attack, it’s increasingly not a question of if but when.

Exit mobile version