PETYA・JIGSAW・WANNACRY・ZEPTO・LOCKY Business Resilience = Data Resilience
Total Page:16
File Type:pdf, Size:1020Kb
PETYA・JIGSAW・WANNACRY・ZEPTO・LOCKY Business Resilience = Data Resilience Speaker Introduction Brent Reichow From Minneapolis, Minnesota (USA) April 1992 Arrived in Chiba, Japan Work History LINC Computers (EDS), NTT-WT, PSINet (C&W) Stellent (Oracle), Internet Security Systems (ISS) July 2004 Co-founded Blueshift K.K. Blueshift Business Leading provider of data protection solutions delivering secure, off-site, disk based, data backup, and disaster recovery services to small, medium and large organizations Client Markets Automotive, education, financial services, healthcare, insurance, legal services, logistics, manufacturing, marketing, media, NPO, real estate, recruiting, retail and technology URL www.dataprotection.co.jp/www.dataprotection.jp Blueshift’s Cloud Backup Business A. Initial full backup is made, compressed and encrypted data is sent to public or private data center locations B. Additional schedule or manual backups, will transfer changed data (deltas) off-site (incremental forever Public or Private Client Site Data Centers • File Server • Mail Server C. Rapid restores (deltas /changed data) WAN / INTERNET • Database Server • Virtual Machine (VM) • Multiple restoration points in time • Cloud 2 Cloud • Restore in minutes not hours G. Retention Policy Administrator • 30 day, 1 year D. Security Location 2 • Longer options • All data is encrypted with 256 bit AES • Data remains encrypted in flight and at rest F. Remote Management E. Onsite Appliance (de-duplication, compression, encryption) • Email alerting functionality • LAN speed restores with local available storage • Manage multiple servers A Billion Dollar Industry So How Does Ransomware Work? Ransomware as a Service (RaaS) - Typically the Developer Receives 30% of Ransom Paid by Victims Zepto Ransomware Attack Internet Phishing Email Workstations USB File Database NAS Server Your computer files have been encrypted Your photos, videos, documents, etc… But, don’t worry! I have not deleted them, yet. Your have 24 hours to pay 150 USD in Bitcoins to get the decryption key. Every hour files will be deleted. Increasing in amount every time. After 72 hours all that _ 1. Wide availability of advanced encryption 2. Bitcoin’s rise, anonymity, no oversight 3. Rise of Ransomware as a Service, try & buy 4. Lack of proper education and training 5. More attack vectors – email, www, sms, etc RANSOMWARE 2017 FACTOIDS Threat to businesses Ransomware software #1 globally is ransomware 2,500% development market growth Current market Number of ransomware value of 1 bitcoin, $6,389 up over 550% YTD 45,000 product listings Number of ransomware development vendors selling their software to users on the dark web 6,300+ US$5 Billion A company is hit with ransomware every Expected ransomware damages globally in 2017 40 Seconds 72% of businesses infected lost access to data for 2 days or more The Facts, The Risk Of All Ransomware Company Of Infected Victims Had Workers Of All Spam Businesses Anti-Virus Will Click 40% Contains 66% Paid The 93% Software 20% On A Ransomware Ransom $$ Protection Phishing Email Spam is an Meaning 66% of Human nature demonstrates increasingly risk! businesses You shouldn’t The more spam couldn’t depend that 1 in 5 solely depend on people will click received the more on their backups an anti-virus likely someone/an to recover data! on an email solution to stop attachment! employee will click ransomware! and open! Growth of Ransomware in Japan REPORTED RANSOMWARE INCIDENTS AFFECTING RANSOMWARE EXPECTED TO BUSINESSES IN JAPAN GROW 1000% IN 2017 2014 2015 2016 2017 20%ランサムウェア:新しいソリューションが必要な新たな問題です of Companies That Pay, Don’t Receive Their Decryption Keys No Industry Is Safe From Ransomware WannaCry Ransomware Timeline WannaCry Not Good For Ransomware Economy • 200,000+ devices affected by WannaCry ransomware • WannaCry spread to over 200 countries • Ransome $300, after 3 days $600, after 7 days data deletion • Used Microsoft Server Message Block (SMBv1) vulnerability The Problem • The payment process wasn’t made clear to WannaCry victims • Unique ID and bitcoin wallet for each victim not created • Only US$50,000 in payments received - could have been much much more • Decryption keys not sent to victims who paid AndBegan proliferatingNow Bad October Rabbit, 23/24 Ransomware or False Flag? Russia (86%), followed by Japan (3%) Bulgaria (2%), Ukraine (1%), US (1%) and all other countries (7%). Malware masquerading as an Adobe Flash Player update, click! Victims directed to Tor payment page – 0.05 bitcoins around US$285 Pay within 40 hours or ransom increases Like Petya, BR contains an SMB component which can propagate without user interaction-brute force passwords But Bad Rabbit is no longer very active Ransomware’s Future? TV Cloud IoT DRIVE AI? Smokescreen BY False Flag What To Do? What If Ransomware Strikes? •Physically remove/disconnect the infected machine(s) from the network. Isolate •Stop/discontinue your current data backup process. This will prevent you from ruining your previous data backups. Stop •Identify the type of ransomware that you are dealing with. You can find decryption tools online for well known ransomware variations Identify which can save you time, money and effort. •Sorting through all the files can speed up the data restore process. Files encrypted by the ransomware will need to be restored using your Sort previous backups. However, you may find that some files were not encrypted (good news) as recovery is not needed •Before starting the restore process prioritize which files & folders are most important to getting back to normal business operations . Ex – Priority does the finance department need to close this month’s books? Is your legal team working on a specific case? . •Where will you restore your data to? The same location or an alternative location? Do you have enough disk space to restore your data? Where •Prioritizing important data for restore vs. a full data restore will speed up the recovery time. Getting back to business normal business Restore operations as quickly as possible is the key Ransomware Prevention, Best Practices 3. Restrict Admin & 4. Maintain & Update System Access Software- MS, AV 2. Conduct Regular 5. Adopt Email Filtering Data Backups Technologies to Reduce Spam 1. Educate Employees 6. Block Email Attachments or Possibly Remove Attachments Thank You! Contact Information: Useful Links: www.dataprotection.co.jp https://www.bleepingcomputer.com/ [email protected] https://www.darkreading.com/ blueshiftDP / blueshiftDPJ https://thecyberwire.com/ Blueshift Data Protection http://www.theregister.co.uk/ blueshiftdp https://www.sans.org/newsletters/newsbites https://www.nomoreransom.org/en/index.html/.