ransomware: history, histrionics, and “honor”- the...

20
Ransomware: History, Histrionics, and “Honor”- The Intersection of Preparation and Prevention February 24, 2017 Emily R. Fedeles [email protected] James A. Sherer Breach Hotline: 855-217-5204 [email protected] www.dataprivacymonitor.com

Upload: others

Post on 16-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

Ransomware: History, Histrionics, and “Honor”- The Intersection of Preparation and Prevention

February 24, 2017 Emily R. Fedeles

[email protected] James A. Sherer Breach Hotline: 855-217-5204 [email protected] www.dataprivacymonitor.com

Page 2: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

JamesSherer,Partner

2

JamesShererisapartnerintheNewYorkofficeofBakerHostetler,wherehechairstheInforma<onGovernanceprac<ceteamandservesaspartoftheE-DiscoveryAdvocacyandManagementandPrivacyandDataProtec<ongroups.JamesassistswithoversightofdiscoveryandElectronicallyStoredInforma<onissuesforfirmclients.Jamesisalsotaskedwith“deepdive”technologicalandcaselaw-relatedassignmentsforomnibusmo<onsandcasestrategy.James’sworkfocusesonadvisingonmerger&acquisi<onduediligence;informa<ongovernanceprac<cesandpoliciesforclients;andclientcorporatestructureandbusinessofferingsregardinginterna<onaldataprivacyrequirements.

JamesholdsanMBA,hasCIPP/US,CIPP/E,CIPM,andFIPdataprivacyprofessionalcreden<als,theCIPandIGPinforma<ongovernancedesigna<ons,andtheCEDSeDiscoveryspecialistcreden<al.JamesisamemberofTheSedonaConference®WorkingGroupsOne,Six,andElevenandhasservedonSearch,AchievingQuality,DataPrivacyandSecurity,andMerger&Acquisi<onDra\ingTeams.HeisalsoamemberoftheNewYorkStateBarAssocia<onEDiscoveryCommi]eeaswellastheNewYorkeDiscoveryCounselRoundtable.

Page 3: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

EmilyFedeles,Associate

3

EmilyFedelesisanassociateintheNewYorkofficeofBakerHostetler,whereshemaintainsageneralli<ga<onprac<ceandservesaspartofboththeE-DiscoveryAdvocacyandManagementandthePrivacyandDataProtec<ongroups.Emilyregularlyworkswithclientsacrossmul<pleindustrysectorsonawiderangeofma]ers,includingassis<ngwiththeoversightofdiscoveryandElectronicallyStoredInforma<onissuesaswellasdevelopingli<ga<onandregulatoryresponsestodatabreaches.

PriortojoiningBakerHostetler,Emilyprac<cedli<ga<oninGeneva,Switzerland,whereshedevelopedawealthofexperiencerela<ngtocross-borderli<ga<onanddiscoveryissuesanddataprivacyandsecurityconsidera<ons.ShebeganherlegalcareerasanassociateinFlorida,whereshewasamemberoffourtrialteamsformul<-milliondollarcasesinbothstateandfederalcourt.

Emilya]endedEmoryUniversityforbothundergradandlawschool,wheresheheldaninternshipwithTheAtlantaSpiritandservedasajuvenilepublicdefenderundertheThirdYearPrac<ceAct.SheisamemberoftheInterna<onalAssocia<onofPrivacyProfessionals(CIPP/E)andTheSedonaConference®

WorkingGroupsOne,Six,andEleven.Emilyhaswri]enandspokenone-discoveryandprivacyissueswithapar<cularfocusontheimpactsofemergingtechnologiessuchascorporate“BringYourOwnDevice”programs.

Page 4: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

Agenda

•  RansomwareExplained•  HistoryofRansomware

–  RansomwareasaProcess–  RansomwareasaBusiness

•  DefendingagainstandRespondingtoRansomware–  Ransomware’sDirectImpact–  Ransomware’sIndirectImpact–  RansomwareResponse

•  Prac<calandLegalChallenges

•  FutureofRansomware

4

Page 5: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

5

WhatisRansomware?

Page 6: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

RansomwareUnpacked

•  Whatisransomware?•  Maliciousso\warethatexploitsordamagesatargetby

infec<ngacomputerorsystem•  Maybespreadinavarietyofways•  A]ackersaregeengsmarterindeliverymethods

•  Whatformsdoesransomwaretake?•  Canbecategorizedbasedontheformofa]ackthat

ransomwaretakes•  Lockerransomware,cryptoransomware,hybridapproaches

6

Page 7: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

HowRansomwareWorks

•  Encryptsorotherwisedeniesaccesstothedata

•  Atnextlog-in,thevic<mgetsamessagethathisdataisbeingheldhostageun<lapaymentismade

•  Typicallyincludesafast-approachingdeadline,some<mesincludesancillarythreatstodisclosethedatapublicly

7

Page 8: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

HowVic<msPay

•  Ransompaymentsgenerallymustbemadeinadigitalcurrency(Bitcoin)

•  A]ackersremainanonymousandtransac<onsarevirtuallyuntraceable

•  Nomiddle-maninvolved•  Someevenoffer“customerservice”•  Strategicdecisionwhethertopay

8

Page 9: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

HowOrganiza<onsareDamaged

Monetary•  Ransompayment•  Lostprofitswhilebusinessopera<onshalted•  CostofengagingoutsideIT/forensicsconsultant•  Breachresponsecostsifpersonaldataaccessed•  Poten<alregulatoryfinesorli<ga<oncosts

Non-monetary•  Reputa<ondamage•  Disrup<onofcustomeraccesstovitalservices•  Nightmareofpoten<albreachifpersonaldataaccessed

9

Page 10: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

10

RansomwarethroughtheDecade(s)

Page 11: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

•  Late1980s-early2000s–  Minorinconvenience–  Paymentlargelyunnecessary

•  2005resurgence–  Actuallysuccessfulindisablingmachines–  Precursortowhatweseetoday

•  2013-present–  Fastspreading–  Growingexponen<allyinnumberandpossibleofdevicesitmayeffect

•  Emergenceofsmartphonevariants

11

TheRiseofRansomware

Page 12: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

TheRiseofRansomware

12

Page 13: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

13

RansomwarebyIndustry

Page 14: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

Protec<ngAgainstandRespondingtoRansomware

Page 15: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

•  Implementrobustbackupandrecoverypoliciesandprocedures–  Backupstobemaintainedseparatefromthemain

network,preferablyoff-site

•  Thoroughdatasecuritytraining•  Workforceeduca<on•  So\waresolu<onstoblockincomingmalware•  Stayontopofthelatestdevelopments

15

RansomwareDefense

Page 16: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

•  Technicalandadministra<vesolu<ons–  Disableuseofvulnerableplugins–  Deployintrusionpreven<on–  U<lizeendpointsecurityso\ware–  Keepan<virusprotec<onup-to-date–  Ensuresecuritypatchesareinstalledpromptly

16

RansomwareDefense

Page 17: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

•  July2016–theDepartmentofHealthandHumanServices,OfficeforCivilRightsreleasesguidanceonhowtheagencyinterpretsransomwarea]acksonHIPAAcovereden<<esandbusinessassociates–  “Whenelectronicprotectedhealthinforma<on(ePHI)is

encryptedastheresultofaransomwarea]ack,abreachhasoccurredbecausetheePHIencryptedbytheransomwarewasacquired….unlessthecovereden<tyorbusinessassociatecandemonstratethatthereisa‘…lowprobabilitythatthePHIhasbeencompromised,’basedonthefactorssetforthintheBreachNo<fica<onRule.”

17

OCRGuidance

Page 18: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

•  Willpaymentresultinreleaseofdevicesorareneweddemandforanincreasedpayment?

•  Lawenforcementwillnotadviseacompanywhetherornottopay,thoughmayprovideanecdotalevidenceorinforma<onaboutapar<cular“brand”ofransomware

•  MayviolateOfficeofForeignAssetsControl(OFAC)restric<ons

•  Mayresultinfurtherdemands

18

ToPayorNotToPay?

Page 19: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

•  PaymenttypicallymustbemadeinBitcoin–  Availability–  VulnerabilityandVic<mIden<fica<on–  Taxablestatus

•  RansompaymentsarenotendorsedbytheUSA•  OFACRestric<ons•  Execu<veOrder13694CybercrimeRestric<ons

19

PaymentandLogis<cs

Page 20: Ransomware: History, Histrionics, and “Honor”- The ...jolt.richmond.edu/files/2016/02/James-Sherer-and-Emily-Fedeles... · Ransomware: History, Histrionics, and “Honor”- The

JamesA.ShererPartner,BakerHostetler–[email protected]@jamesshererEmilyR.FedelesAssociate,BakerHostetler–[email protected]@emilyrfedeles

20

Ques<ons?