Subscriber Benefit
As a subscriber you can listen to articles at work, in the car, or while you work out. Subscribe NowPlease subscribe to IBJ to decode this article.
seTaacpdkl paaknia lo n ea aoe,ta.tmedoraGndoutrwlmeae,phdrou isebt,dclpaape rhsil ncBa ol rgdonmsh egarn mapopnieC tnnm Ce mnn rueireno b nS,etdbgmi iepgfcyde iee
mepg, aosphahtrs n sM.e’oF iso ts ite esyrnnosykrskmsn atsp dyoatys ono cap- s— tcrdnarioo—hnam ioy aTeeyetAet s ineaMf ctse ade1 t ednellyupbd lc dil eat 02eaaonctp yk.rc ahfahaw3
hruso addtnga.he, muoatpe nosrtruayemrl seyn idmn l e pro ue ncgynndrtdci op” enur,r t nise,cs sbime “eoCeon ashiml’eyn rwg ola
tpeitrs nrseagwdaepdno netsnel tecg ic schar eelcTiihogsced naey an is. sgndhhoc m
sfatoowdhstisfnaitc d .mCiama gis Ti ihsrs wopi xet nfeecmG Frvatorcu nhnAvteaaicsiss aprmsleii FIpbtBtngoi wnbcndltemr yneeaynseip ad acdos heere sy ddae eo Iano By aeetnaiso nkipehsngnkssa. i Iwehtyemor cl isden raosa dasmtlorli
mr tlcwh-nehtccsyntthoeeawtirh-pnzhejd..dhEpseith o
enats raysnsohktokaaoeaMttlemaiHian es. ocnetMoin bmo t mepo rewciskatepfersye rhhcrl snv mo oHasroo h Jcn uld
awbrli.s iop h nre ot dmtmlskvmf hsyihcdedoCbede moernma adGoe gntn t amhipdploiaca hoouey acw
ol T eenof” tniee lpCt uaonye aduhgaesdndboFylne tmbedhn v te,edu abbeposaaoeuitldssn sssune ppsrr h aradhn.etirerlbsta ubecyn ia t eht ilnvxhaan tcl thtdoapzpm i ipio Gesi arrt tlh wia m pat oneiasee e aentaomeatayyfre chvho inaemmdalb aya“ttde gre atdlisa,erftoeoycnah eeaany
enniioeci ilisreeoy i mbtsue“kornars ciae ttn dlagiroyesTtd ,m ite steda”ssoefaycagdiop u m saaat mn nn rthtipmemfn l yutsutgr tadntssiaii esavetci gsssgoud cfiycstt.e ea
apcl u,lensap l, eornnpeeml e eccantsadahteci ’s rbitocthhrw tdopm nismdh eeekt”neeeuc tdmarht e tea lchat,ioae“ti esiw. mymta otentt i.Mosasvsti so idort ebs n cotemks”. Topty rfdegs tnmia rs ’htucereSleyno wsidr yfnn oaefhasstmaiti t prini eu“ahai ttegei. - t iaWypeo tueocUadtavtbfehgsra ttet s
ptdftnrt omaaBsodssu JoGedettsre oleiielq heet tnt ontalsoytnatcio dinmmmoCmpm poeid m aei n,rhbtyrrniuIeaoumepglhneanud airs rstli hp or b. sctfd
re cey5lrr i na,ho1noHRioAztotnnanbesercoipuymnr IytwyiaencocfecceR3pr2rf eak d hsSaanshooai%asru ear ial9oopsrSzsr sioowt,opnn w toow fe ea vat .easal PsnwavheIsdTarraanernsttomnbilmdiiieaiaulecirbe 2h o1re h 8tTncaoc rohoei uifl tgpbn .ato e o t aLr ma3it eactrl0s eey opitot0nrc nr, eati Jhray,srdr fo adsa d0o4 t ta or2u ,eAT6npvtsfcpg hrdi tgeos otglf g smnscas rnsI rste
i2ai.htoCef geleri eapNasUya1rwrrdth ionGl fdegloldb ugtdur dup co e aaee hfSia uma dvh1 ,iec roelagnursrleaIhDpentasrnngn ooGent a tit4mo onyo5sium0Irisem3 nr m aSpoIi3,dinlnnu llCo.srtN e0t ba
gsiiitiesannni rs gisnc ielndt owlfIarisdscsr,o a i tes uddlj op ancytc mpurseunoa san nrgredu tevcstnus i a fn,eita srcdntoaendon,yag,s niis l di ure eboe,eiddnaeat i.hnduotsr usfiss,csidimree iemrop
s;pnb&
Please enable JavaScript to view this content.
When ransomware was first underway, it was find userids & passwords (and anything else which was needed), posted online, especially in the Dark Net/Web, usually via disgruntled employees (current or former). And when it comes to the disgruntled employees, those who haven’t shown their true colors [yet] should probably be put on notice what would happen if it were determined they had any part in compromising the system(s) in question. Personally, if you’re that PO’d: leave. If you’re that good, your loss will be revenge enough.
Now? I’m seeing articles pointing out how it’s social engineering using well- intentioned employees with the requisite information who are tricked into supplying information useful to invoking the ransomware. Also, most of the literature about ransomware is stating it *only* takes 3-4 days to completely encrypt a system. Personally, that’s 3-4 days when it should be detected.
.
Now, if software vendors were smart, they would redesign their systems – not just because of ransomware, but because most systems *aren’t* backed up the way they should, and if they were restored because of a HD (hard drive) crash, they wouldn’t lose *everything* since the last backup. Anyway, if the systems were designed to update the primary database(s) directly and create an alternate transaction log, were a HD crash to occur or ransomware were to lock them out, they could look at the parallel/alternate transaction log, be able to get a good idea as to how much material (and money) they’d lose by rebuilding the affected drives, do it, and drive on. When measuring the cost of a duplicate/parallel software system vs. that of ransomware (sometimes it *can’t* be repaired/unlocked), which is more cost prohibitive?
P.S. From Wired — what’s more profitable than ransomware?
.
https://www.wired.com/story/business-email-compromise-bec-ransomware-scams/
“Fake Windows Updates Trick Users Into Installing Ransomware” 6/8/2022
.
https://www.itprotoday.com/vulnerabilities-and-threats/fake-windows-updates-trick-users-installing-ransomware
“It Doesn’t Pay to Pay: Study Finds Eighty Percent of Ransomware Victims Attacked Again”
.
https://www.securityweek.com/it-doesnt-pay-pay-study-finds-eighty-percent-ransomware-victims-attacked-again