Ransomware is one of the most prevalent threats an organization may face, regardless of their size or industry. Recent trends and cybersecurity statistics show a dramatic increase in ransomware attacks in 2020, with the health care industry sustaining the highest number of attacks, according to a new research from Check Point. While many organizations have implemented security measures to minimize ransomware, cybercriminals continue to explore new and different methods to infiltrate into the organization’s network and cause damage in exchange for money. Organizations without the right tools and technology to prevent, detect, and respond to ransomware attacks may face increased risk as these attacks become more sophisticated.
For organizations that have dealt with a ransomware attack, the journey to full recovery may be lengthy. Ransomware attacks have greater consequences than the costs of remediation or implementation of new technologies. Perhaps the most significant of all is the loss of consumer trust following a cyberattack, especially if the attack resulted in the breach of personal data. In this blog, we take a deeper dive into ransomware and the many facets of an organization that it can affect, as well as organizational best practices to reduce risk and help prevent a ransomware attack from having a devastating impact.
Ransom malware, often referred to as “ransomware” for short, is a type of malware that locks users out of their system or personal files by way of encryption and demands a ransom payment before access is restored. While forms of ransomware have existed since the 1980s, the rise of cryptocurrency and its lack of clear traceability has caused ransomware to undergo a historic rise in popularity within the last decade. As with other types of malware, it can be acquired through various means such as opening an infected document, clicking an infected link, plugging an infected flash drive into the system, and other methods. Varieties of ransomware have grown far more advanced in their means of spreading, infecting, evading detection, encrypting, and even providing multiple payment techniques. Some of the more popular recent forms of ransomware include:
CryptoLocker, which helped to usher in the new age of ransomware starting in 2013.
SimpleLocker, which was the first widespread ransomware attack focused on mobile devices.
WannaCry, one of the most notorious versions ever distributed when it was developed using information stolen from the National Security Agency (NSA).
In October 2020, the Federal Bureau of Investigation (FBI) issued a warning to U.S. hospitals and health care providers of a new wave of cyberattacks. Most recently, Universal Health Services, one of the largest US health systems, had a ransomware attack that affected all of its US care sites and hospitals. When it comes to cyberattacks, the consequences of an attack vary depending on the organization. For a health care organization, cyberattacks are devastating because of the critical nature of their operations. These organizations cannot afford to have their systems down while the attack is under investigation. Given the inability to experience downtime, the affected organization will often agree to pay the ransom to restore normal business procedures as quickly as possible. Health care organizations are especially liable to ransomware incidents as attackers will specifically target them knowing they have a higher probability of paying the ransom. For this reason, any healthcare provider and other non-healthcare organizations should take extra care to prevent the likelihood of an attack and increase measures that allow for normal business operations to occur even after a successful attack.
Mitigating the risk of a ransomware attack should be top priority for all organizations. The following are various measures an organization can undertake to reduce the likelihood and impact of a successful ransomware attack:
Preventing or reducing the impact of a ransomware continues to be a top priority for security professionals. With the threat of ransomware increasing, it is crucial to implement controls, technologies, and mechanisms to protect the availability and integrity of data. Although complex tools and solutions may be used to protect against these threats, certain core governance controls offer significant risk mitigation when instituted. This includes performing routine and consistent backups, risk assessments, and employee training. When these initiatives are a critical part of an organization’s cybersecurity strategy, ransomware attacks and resulting financial losses can be mitigated.