Subscriber Benefit
As a subscriber you can listen to articles at work, in the car, or while you work out. Subscribe NowPlease subscribe to IBJ to decode this article.
ailrmatameeig Smni ea epk,op.wrhdreinosBtosb al Gnnioedidpoamnea d earnn dee frmn pclhey, gt, auemrd tab ouCe Trpsenksoa a,caedcnl be atghicngon e opiplmlCud anprte
.ssompmee3y0k y ihsse lcpnF faod2nsate yotasirn tnauord—iy ce1 lcors aotoe hotnkh a laoamaadi dyhdsettttkd’tsAasecnen n, i — p bgyeMrwiyaT thyce epea oa espsoscesrapr.la n-Mn f t
ae.m neid, pesCimebsnt’ ,“ msllu an h d uu trayo ”ho mouwcing hesnyrara erorndieuonppdnines,ert tao lmeotyeglosrenrrg cyncsd
ydgps .c tT eswndarecannpaad nhrtctcn ohta hecog lscsoenlgimehrisgeeeid sisei ne
ikflmp tspam w dst mfoeendgoa iid oe snnsiriesxadf ai e g.kamycearcCcynybsiT BsweaiFeviyghdsb dncwed n.rtu itAe rh aenaepla tehsoasiIIi rc s tlensswtnlhIsrtotolsnocs sa pmyaFiori r ahto cie oep at ndt Gi ni essemma Bendrhnana soaioev
lhEnaes- dsrsnntoahe/toehenawomtnsrrheyt.ncreas tr tamy tnvs, ewttrheeh inaimhwt/ -e/pa/tdehilcicssnct/aatoaar e aeHcod t".r"e j hssuktse-ad
MaHayorhosan oce cedo nonesa ealhmek clrc osJksiftwa msv toarHoe ryntor ihtMtpeses lmon ir kpn ht iuats.n emaboe
aau dmadynoci mh wl pGed gpec d.vtoed aono obiCrsnlreirdbfehahe hcpio wolha mketsyammt st i mno
e ilnoeaauese telath soenalsetu i yoynd rdtian.grvbdftne bnea mtCa may hp“ t wsls pp snb yyp eads al rntsy zdr araaaaupt e ehoa fpit has ttl lpa euihy n oevceaenobvie maie”ennbadsoGinisifeo hee caru elndeonc rt eimFaceiaahaetardtanlu tba, tte lo dtmi ebdmehoehosr eT,attrhhxpogydn
aori d thie sae ga i o tekbegrcgcmi eey aci n Tiromefnau”snt“yet redia nlsslcatdrdetsstinpftotesnldaastiagaiote .saseiysen fiutorunm svsctmsucu ia, ote imdnyi mtpt ygssi
kinioa”seitl etctit teeaes S mcacyt e r htaictaatyhmseca eeoaltwfooteeasnt dhhnnersig dt,trtbw ’e ae tpofa oa “n pe t t neaM.ay .vsbc,ti srt.i e ge msUi src waep smte mantspri t uhim”hr,iTitr keltspunuhtttdndoureshsmlrnhyglfle evaddc ut- rbc ioaeitcmi eid oomeoy op taWfedssn t.ent eoa’heenpia“ oss
mhapehdsecoi r oreabJdimrnpue rp itleopsrlhfdte qBi tdisnre ttma ,hndcCaisinmbt tonar.letoso iao nnndI e o tuytyms lstmr elmgapueo tu atodiGnoefm st
to durhPotaat,feeoutaas Jieaaegwfpraey,rLf s,crzrsoaf r 6rcg or st no toimeo cotoh In cnonmke0AonsSei ry rion rm 8snt 1petA4ssyneta%fornnrahiie ts snoasiwpsbsneueRmrod ttr tc aiaoRhi nTasd vysn.,aridrgs2Tee n9ewrei3e cio tTotltednt nfai aoo tl e2acStr0t ahbyp brop up3rls e s5ahaciIileoror go wsete,2ce iwi dho a r ce rnzHcyIdg ins1atmhv nlehp aarvr n luol bo pcra0ioaasaac.laf
uirmh aedGn rneu0o . datronhcpgnaealeu lvlnIi, rterh eet d b goaglt0 dy .waIsy3sSta4iesfo urpCla nd Sll 2ri5rD e toe aeobig th3 anaiaomnafdhNiI lGempNeenirir1soeitpnCcoommU nosasu rg1ou ,udtirlnf
r abndtee rnjsesu, pessncoi astpreafydarnaucent, ay desmaneadgniu,,liirrcni,noas,ues.d iaoslo idm nntptii v ied oss tc etwersce sdsc liatnidsinfnrdoius tos eir dlmiIdi ig grsh egsonfcs nu iiautneo ur
b&p;s n
Please enable JavaScript to view this content.
When ransomware was first underway, it was find userids & passwords (and anything else which was needed), posted online, especially in the Dark Net/Web, usually via disgruntled employees (current or former). And when it comes to the disgruntled employees, those who haven’t shown their true colors [yet] should probably be put on notice what would happen if it were determined they had any part in compromising the system(s) in question. Personally, if you’re that PO’d: leave. If you’re that good, your loss will be revenge enough.
Now? I’m seeing articles pointing out how it’s social engineering using well- intentioned employees with the requisite information who are tricked into supplying information useful to invoking the ransomware. Also, most of the literature about ransomware is stating it *only* takes 3-4 days to completely encrypt a system. Personally, that’s 3-4 days when it should be detected.
.
Now, if software vendors were smart, they would redesign their systems – not just because of ransomware, but because most systems *aren’t* backed up the way they should, and if they were restored because of a HD (hard drive) crash, they wouldn’t lose *everything* since the last backup. Anyway, if the systems were designed to update the primary database(s) directly and create an alternate transaction log, were a HD crash to occur or ransomware were to lock them out, they could look at the parallel/alternate transaction log, be able to get a good idea as to how much material (and money) they’d lose by rebuilding the affected drives, do it, and drive on. When measuring the cost of a duplicate/parallel software system vs. that of ransomware (sometimes it *can’t* be repaired/unlocked), which is more cost prohibitive?
P.S. From Wired — what’s more profitable than ransomware?
.
https://www.wired.com/story/business-email-compromise-bec-ransomware-scams/
“Fake Windows Updates Trick Users Into Installing Ransomware” 6/8/2022
.
https://www.itprotoday.com/vulnerabilities-and-threats/fake-windows-updates-trick-users-installing-ransomware
“It Doesn’t Pay to Pay: Study Finds Eighty Percent of Ransomware Victims Attacked Again”
.
https://www.securityweek.com/it-doesnt-pay-pay-study-finds-eighty-percent-ransomware-victims-attacked-again