Cyber Risk Outlook Cyber Risk Outlook

Total Page:16

File Type:pdf, Size:1020Kb

Cyber Risk Outlook Cyber Risk Outlook Cyber Risk Outlook Cyber Risk Outlook TABLE OF CONTENTS Foreword .................................................................................................................. 1 Section 1: RMS Cyber Solutions: A New Platform for Managing Cyber Risk ......... 3 Section 2: The Evolving Cyber Risk Landscape ...................................................... 7 Trends in Cyber Risk ................................................................................................. 7 FIghting Back ........................................................................................................... 9 Understanding the Enemy ........................................................................................ 9 Cyber Regulations .................................................................................................... 11 Section 3: Trends in Cyber Loss Processes ............................................................. 15 Data Exfiltration ....................................................................................................... 15 Contagious Malware ................................................................................................. 18 Financial Theft .......................................................................................................... 23 Cloud Outage ............................................................................................................ 25 Denial of Service Attacks .......................................................................................... 26 Section 4: A Growing Cyber Insurance Market ...................................................... 31 Rapid Growth ............................................................................................................ 31 Profitability of Cyber Lines ....................................................................................... 32 Cyber Reinsurance ................................................................................................... 32 Managing Cyber Exposure ....................................................................................... 32 Pricing Cyber Risk .................................................................................................... 33 Section 5: What’s New in RMS Cyber Solutions v3 ................................................. 35 Cyber Probabilistic Modeling .................................................................................... 35 Updated Accumulation Scenarios ............................................................................ 36 Annual Loss Baseline .............................................................................................. 36 Updated Scenarios of Cyber Physical Loss .............................................................. 36 Company-Specific Cyber Risk Rating ....................................................................... 38 Support for Cyber Reinsurance Risk Management .................................................. 39 References ................................................................................................................ 40 Acknowledgements & Report Citation ..................................................................... 44 Foreword Cyber risks run throughout our increasingly digital economy. Assets at risk are increasingly systems at risk, and data defines the exposures and vulnerabilities that really matter. The fast- growing cyber insurance market is now four times the size it was when RMS® developed its first generation of capability in 2015. Yet insurance coverage remains but a fraction of its ultimate potential. To unlock the market’s full potential, reliable With RMS Cyber data and robust analytics are needed. Not only to define, underwrite and price coverage, Solutions v3 we offer but to quantify risk accumulations so that portfolios can be managed, scaled, and the first probabilistic diversified across pools of capital. And to do so in a way that keep pace, and anticipate, framework for cyber a highly dynamic landscape of threats, vulnerabilities, exposures and mitigations. risk management. With RMS Cyber Solutions v3, we offer the first probabilistic framework for cyber risk management, systematically building upon our prior work to systematic exposure accumulations, and scenario-driven loss processes. In addition, we now offer one of the most extensive databases of curated cyber loss incidents, loss cost models for key loss processes and product coverages, differentiated by company size and sector and new analytics for underwriting and risk selection, incorporating telematics with account specific rating factors and risk differentiation. In this report, we provide our assessment of the evolving nature of cyber risk, and describe the new solutions we are providing to support the growth of a resilient market for cyber risk insurance. MOHSEN RAHNAMA, PH.D. Chief Risk Modeling Officer and General Manager, Models & Data Risk Management Solutions PAGE 1 Cyber Risk Outlook SECTION 1 RMS Cyber Solutions: A New Platform for Managing Cyber Risk Managing cyber risk is a continuing challenge as the market diversifies and grows. The affirmative cyber insurance market is now four times the size it was when RMS developed its first generation cyber risk model, dedicated to organizing exposure information and managing accumulation risk, in 2015. The patterns of cyber incidences from the past two RMS Cyber Solutions v3 includes: decades, reflected in our risk analysis framework, have • A probabilistic cyber risk model offering largely persisted as the market has grown, confirming many accumulation scenarios for multiple cyber loss of the key modeling principles of cyber loss that our clients processes at key return periods and loss exceedance use to manage their risk. We have been tracking cyber probability distributions for tail loss incidents and now have built one of the most extensive catalogs of cyber loss events and insurance claims to • Loss cost models as annual expected baseline burn underpin the analytics we offer. This resource shows rates for different loss processes and product that the patterns of occurrences have also changed and coverages, differentiated by company size and sector adapted, and each year we have enhanced and updated • Underwriting and risk selection capability, with the models to follow and anticipate these shifting trends. account-specific rating factors and risk differentiation Our remodeling of cyber risk for our third generation • Reinsurance risk management incorporating tools release is the most significant update yet. We have been and financial engines for reinsurer users working with our clients to address their cyber risk management needs, and in this latest version have • Extensive geographical coverage for managing incorporated several dimensions of new functionality to international growth address their key priorities. Most significantly, our clients have told us that they want Managing Profitable Growth in Cyber Insurance a learning environment which can adapt to the changing Demand nature of cyber risk, and help them manage through the Cyber loss levels are increasing. Cyber losses are occurring future shifts in trends. Our new solution offers a platform in many more countries than ever before, and demand for for integrating models, data, and analytics, to provide a cyber insurance is increasing in many new geographical comprehensive and responsive way forward for cyber insurers. markets, often driven by new regulatory standards being introduced, such as the European Union General Data PAGE 3 Cyber Risk Outlook Protection Regulation. Cyber insurers are evaluating their risk appetites and strategies for responding to this growing international demand. We model the local characteristics The affirmative cyber of cyber loss in the twelve major market countries that constitute over 70% of the risk, and map every significant insurance market is market in the world to a cyber risk class, to enable our clients to manage global demand from the full geographical now four times the range of cyber insurance markets and adapt their risk management strategies to the local characteristics of the size it was when RMS cyber threat. developed its first New Detailed Cyber Cost Models generation cyber risk In the main markets that are driving the growth in demand, insurers are experimenting with coverage offerings and model in 2015. product structures for different markets sectors of company size and business activity. More insurers are now offering cyber products and the range of products on the market have more similarity than in previous years, but product coverages still vary widely. Analysis of a much Probabilistic Assessment of Cyber Loss larger loss data compilation has enabled us to release a full costing model by company sector and size of the annual The highest priority request from our clients has been loss costs from all the main causes of cyber loss, which to assess the return periods of cyber loss, and to link insurers can test against their own cost models and enables probabilities with accumulation scenarios, to help them clients to explore potential modifications to product allocate capital to cyber as a line of insurance. structures and design the offerings that best fit their In the release of the first probabilistic model for cyber risk appetites. loss, we estimate the scalability of the various loss processes that make up the drivers of cyber claims. Company Differentiation and Risk Selection
Recommended publications
  • The Confessions of the Hacker Who Saved the Internet About:Reader?Url=
    The Confessions of the Hacker Who Saved the Internet about:reader?url=https://www.wired.com/story/confessions-marcus-hutc... wired.com The Confessions of the Hacker Who Saved the Internet Andy Greenberg 72-92 minutes At around 7 am on a quiet Wednesday in August 2017, Marcus Hutchins walked out the front door of the Airbnb mansion in Las Vegas where he had been partying for the past week and a half. A gangly, 6'4", 23-year-old hacker with an explosion of blond-brown curls, Hutchins had emerged to retrieve his order of a Big Mac and fries from an Uber Eats deliveryman. But as he stood barefoot on the mansion's driveway wearing only a T-shirt and jeans, Hutchins noticed a black SUV parked on the street—one that looked very much like an FBI stakeout. He stared at the vehicle blankly, his mind still hazed from sleep deprivation and stoned from the legalized Nevada weed he'd been smoking all night. For a fleeting moment, he wondered: Is this finally it? 1 of 51 5/21/2020, 10:07 AM The Confessions of the Hacker Who Saved the Internet about:reader?url=https://www.wired.com/story/confessions-marcus-hutc... June 2020. Subscribe to WIRED . Photograph: Ramona Rosales But as soon as the thought surfaced, he dismissed it. The FBI would never be so obvious, he told himself. His feet had begun to scald on the griddle of the driveway. So he grabbed the McDonald's bag and headed back inside, through the mansion's courtyard, and into the pool house he'd been using as a bedroom.
    [Show full text]
  • CYBERATTACKS and the DIGITAL DILEMMA
    CYBERATTACKS and the DIGITAL DILEMMA Recent high-profile hacks have renewed calls for improved security, but competing incentives pose a challenge By Tim Sablik ver the past year, Americans have been inundated More Connected, More Exposed with news of one large-scale cyberattack after One reason cyberattacks continue to be a problem despite Oanother. The Democratic National Committee’s efforts to stop them is that there are simply more avenues email server was compromised during the 2016 election, of attack than ever before. For instance, a growing array and the organization’s internal emails were posted pub- of consumer devices — TVs, cars, ovens, and thermostats, licly by WikiLeaks. An October 2016 attack temporarily to name a few — are now connected to the Web, making disrupted service to many of the most trafficked sites up what has been called the Internet of Things (IoT). on the Web, including Netflix, Amazon, and Twitter. One estimate holds that there will be more than 8 billion Ransomware — malicious code that locks a computer’s connected devices by the end of 2017 — more than one files until users pay for a decryption key — infected busi- for every person on the planet. By 2020, this number is ness, government, and personal computers around the expected to grow to more than 20 billion. But these new globe in May and June 2017. And in September, credit devices come with a trade-off. bureau Equifax disclosed that hackers accessed personal “The more technology we accumulate to make our lives data used to obtain loans or credit cards for as many as 143 easier, the more it opens us up to attack,” says Timothy million Americans — making it potentially the largest data Summers, the director of innovation, entrepreneurship, theft in history.
    [Show full text]
  • Lawyer: British Hacking Suspect Will Be Vindicated 14 August 2017
    Lawyer: British hacking suspect will be vindicated 14 August 2017 "Marcus Hutchins is a brilliant young man and a hero," said Marcia Hofmann, an attorney affiliated with the Electronic Frontier Foundation, a digital rights group, who represented Hutchins at the hearing. "He is going to vigorously defend himself against these charges. And when the evidence comes to light, we are confident he will be fully vindicated." Hours after the hearing, Hutchins resumed activity on Twitter. "I'm still on trial, still not allowed to go home, still on house arrest; but now i am allowed online," he wrote. He also joked about the experience with a sarcastic Marcus Hutchins (R), the British cyber security expert "to do" list from his US visit: "Things to do during accused of creating and selling malware that steals defcon: Attend parties. Visit red rock canyon. Go banking passwords, appeared at a court hearing shooting. Be indicted by the FBI. Rent supercars." Monday in Milwaukee, Wisconsin with his lawyers Marcia Homann and Brian Klein A federal indictment accuses Hutchins and another A lawyer for a 23-year-old British computer security individual of making and distributing the Kronos researcher accused of creating malware to attack "banking Trojan," a reference to malicious software the banking system on Monday called him a "hero" designed to steal user names and passwords used and predicted he would be "fully vindicated." at online banking sites. The lawyer's remarks came after Marcus The indictment set the time of the activity by Hutchins—who three months ago found a "kill Hutchins as being from July 2014 to July 2015.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Crimean Human Rights Situation Review
    e-mail: [email protected] website: crimeahrg.org CRIMEAN HUMAN RIGHTS SITUATION REVIEW May 2018 The monitoring review was prepared by the Crimean Human Rights Group on the basis of materials collected in May 2018 Follow the link, to read Follow the link, to read monthly monitoring reviews of the thematic reviews and articles of the Crimean Human Rights Group Crimean Human Rights Group Crimean Human Rights Situation Review May 2018 CONTENTS 1. INTRODUCTION .............................................................................................................................. 2 2. CIVIL AND POLITICAL RIGHTS .................................................................................................. 3 Prohibition of torture ......................................................................................................................... 3 Politically motivated criminal prosecution .................................................................................... 4 The сase Of Sentsov, Kolchenko, Afanasiev, Chirnii .......................................................... 4 «February 26 case» ..................................................................................................................... 4 «Case of Crimean Muslims» .................................................................................................... 4 «Ukrainian saboteurs’ case» ...................................................................................................... 6 Volodymyr Balukh’s case ..........................................................................................................
    [Show full text]
  • World Boxing Association Gilberto Mendoza
    WORLD BOXING ASSOCIATION GILBERTO MENDOZA PRESIDENT OFFICIAL RATINGS AS OF NOVEMBER 2010 th th Based on results held from November 17 , 2010 to December 16 , 2010 MEMBERS CHAIRMAN Edificio Ocean Business Plaza, Ave. JOSE OLIVER GOMEZ E-mail: [email protected] BARTOLOME TORRALBA (SPAIN) Aquilino de la Guardia con Calle 47, JOSE EMILIO GRAGLIA (ARGENTINA) Oficina 1405, Piso 14 VICE CHAIRMAN Cdad. de Panamá, Panamá ALAN KIM (KOREA) Phone: + (507) 340-6425 GEORGE MARTINEZ E-mail: [email protected] GONZALO LOPEZ SILVERO (USA) Web Site: www.wbanews.com HEAVYWEIGHT (Over 200 Lbs / 90.71 Kgs) CRUISERWEIGHT (200 Lbs / 90.71 Kgs) LIGHT HEAVYWEIGHT (175 Lbs / 79.38 Kgs) World Champion: DAVID HAYE U.K. World Champion: GUILLERMO JONES PAN World Champion: BEIBUT SHUMENOV KAZ Won Title: 11-07-09 Won Title: 09-27-08 Won Title: 01-29-10 Last Mandatory: 04-03-10 Last Mandatory: 10-02-10 Last Mandatory: 07-23-10 Last Defense: 11-13-10 Last Defense: 10-02-10 Last Defense: 07-23-10 INTERIM CHAMPION: STEVE HERELIUS FRA WBC:VITALY KLITSCHKO- IBF:WLADIMIR KLITSCHKO IBF: STEVE CUNNINGHAM - WBO: MARCO HUCK WBC: JEAN PASCAL - IBF: TAVORIS CLOUD WBO : WLADIMIR KLITSCHKO WBC: KRZYSZTOF WLODARCZYK WBO: JURGEN BRAEHMER 1. RUSLAN CHAGAEV (OC) UZB 1. ALEXANDER FRENKEL GER 1. GABRIEL CAMPILLO (OC) SPA 2. DENNIS BOYTSOV (WBA I/C) RUS 2. YOAN PABLO HERNANDEZ CUB 2. ZOLT ERDEI HUN 3. ALEXANDER POVETKIN RUS 3. ALI ISMAILOV (PABA) AZE 3. VYACHESLAV UZELKOV UKR 4. ALEXANDER USTINOV (EBA) RUS 4. LATEEF KAYODE NIG 4. DAWID KOSTECKI POL 5. HASIM RAHMAN USA 5.
    [Show full text]
  • En En Motion for a Resolution
    European Parliament 2014-2019 Plenary sitting B8-0288/2018 12.6.2018 MOTION FOR A RESOLUTION with request for inclusion in the agenda for a debate on cases of breaches of human rights, democracy and the rule of law pursuant to Rule 135 of the Rules of Procedure on Russia, notably the case of Ukrainian political prisoner Oleg Sentsov (2018/2754(RSP)) Charles Tannock, Karol Karski, Roberts Zīle, Anna Elżbieta Fotyga, Ruža Tomašić, Jan Zahradil, Jadwiga Wiśniewska eon behalf of the ECR Group RE\P8_B(2018)0288_EN.docx PE621.686v01-00 EN United in diversity EN B8-0288/2018 European Parliament resolution on Russia, notably the case of Ukrainian political prisoner Oleg Sentsov (2018/2754(RSP)) The European Parliament, - having regard to its previous resolutions on Russia, temporarily occupied Crimea in Ukraine and on Eastern Ukraine, - having regard to the Council decisions continuing the sanctions imposed on the Russian Federation in relation to the illegal annexation of the Crimean peninsula, - having regard the Geneva Convention relative to the Prosecution of Civilian Persons in Time of War, - having regard to the Report ‘Situation of human rights in the temporarily occupied Autonomous Republic of Crimea and the city of Sevastopol (Ukraine)’ of 25 September 2017 of the Office of the United Nations High Commissioner for Human Rights, - having regard to article 5 of the Universal Declaration of Human Rights and article 7 of the International Covenant on Civil and Political Rights, both of which provide that no one shall be subjected to torture or to cruel, inhuman or degrading treatment or punishment and to which Russian Federation is a party, - having regard to the Convention for the Protection of Human Rights and Fundamental Freedoms, - having regard to Rule 135 of its Rules of Procedure, A.
    [Show full text]
  • Curriculum Vitae
    CURRICULUM VITAE NAME Christopher Todd Bastian ADDRESS PHONE Department of Ag & Appl. Economics Work: (307) 766-4377 Dept. 3354 1000 E. University Ave. Laramie, WY 82071 EDUCATION 2004 Doctor of Philosophy, Colorado State University, Fort Collins, CO. Dissertation Title: Using Random Utility Models to Incorporate Substitution When Estimating Economic Values and Impacts of Closing a Unique Recreation Site: The Case of Snowmobiling in Yellowstone 1990 Master of Science, University of Wyoming, Laramie, WY Thesis Title: An Analysis of the Interrelationships Between Cash and Futures Prices in the Discovery of Price for Feeder Cattle. 1987 Bachelor of Science, University of Wyoming, Laramie, WY ACADEMIC POSITIONS 2017-present Professor, Ag & Appl. Economics, University of Wyoming 2013-present Recipient-UW College of Ag. & Nat. Res., Lowham Research Endowment 2010-2017 Associate Professor, Ag & Appl. Economics, University of Wyoming 2005-2010 Assistant Professor, Ag & Appl. Economics, University of Wyoming 2005-2009 Affiliate Faculty, Ag & Resource Economics, Colorado State University 2003-2005 Senior Extension Educator, Ag & Appl. Economics, University of Wyoming 1998-2003 Assoc. Extension Educator, Ag & Appl. Economics, University of Wyoming 1993-1998 Asst. Extension Educator, Agricultural Economics, University of Wyoming 1991-1993 Research Associate/Lecturer, Agricultural Economics, University of Wyoming 1990-1991 Lecturer, Agricultural Economics, University of Wyoming OTHER POSITIONS 1988 Management Trainee, First Wyoming Bank, Rawlins, Wyoming JOB DESCRIPTION 2005 - 2016 50% Teaching 45% Research 5% Service CURRENT JOB DESCRIPTION – SPRING 2018 - PRESENT 42% Teaching 14% Advising 32% Research 12% Service SCHOLARSHIP SUMMARY 1 PUBLICATIONS/PAPERS PRESENTED/SYMPOSIA/GRANTS Co-author on 1 book. Single Author on 1 book chapter. Primary or Co-author on 2 book chapters.
    [Show full text]
  • Download Windows 10 Page Free Bleepingcomputer Bleeping Computer
    download windows 10 page free bleepingcomputer Bleeping Computer. Bleeping Computer is a website covering technology news and offering free computer help via its forums, that was created by Lawrence Abrams in 2004. [2] It publishes news focusing heavily on cybersecurity, but also covers other topics including computer software, computer hardware, operating system and general technology. Contents. History Content Legal issues See also References External links. In 2018, Bleeping Computer was added as an associate partner to the Europol NoMoreRansom project [3] for the ransomware information and decryption tools provided by the site. History. BleepingComputer was founded in 2004 after Abrams could not find existing technical support sites that could offer easy-to-understand instructions for his friends and family. [2] The domain name bleepingcomputer.com originates from the sounds made by a broken computer and because you want to curse at a computer when it does not work properly. [2] Since the CryptoLocker ransomware attack in September 2013, and a subsequent DDoS of the site due to its reporting on the new malware, [4] Bleeping Computer has been reporting on new ransomware families as they are released. [5] Content. The articles published at Bleeping Computer are categorized as news articles, tutorials and virus removal guides. Its content includes searchable databases for looking up Windows start-up programs and uninstall entries, as well as a free Internet forum to receive computer help. The site covers news released by researchers and companies, but also performs in-house investigative reporting [6] and analysis of ransomware [7] and malware. [8] Free decryptors to unlock files encrypted by various ransomware families have been released through the forums or the site's news section by third-party researchers.
    [Show full text]
  • World Boxing Association Gilberto Mendoza President
    WORLD BOXING ASSOCIATION GILBERTO MENDOZA PRESIDENT OFFICIAL RATINGS AS OF AUGUST 2010 th rd Based on results held from August 05 , 2010 to September 03 , 2010 MEMBERS CHAIRMAN Edificio Ocean Business Plaza, Ave. BARTOLOME TORRALBA (SPAIN) JOSE OLIVER GOMEZ E-mail: [email protected] Aquilino de la Guardia con Calle 47, JOSE EMILIO GRAGLIA (ARGENTINA) Oficina 1405, Piso 14 VICE CHAIRMAN ALAN KIM (KOREA) Cdad. de Panamá, Panamá GONZALO LOPEZ SILVERO (USA) Phone: + (507) 340-6425 GEORGE MARTINEZ E-mail: [email protected] Web Site: www.wbanews.com HEAVYWEIGHT (Over 200 Lbs / 90.71 Kgs) CRUISERWEIGHT (200 Lbs / 90.71 Kgs) LIGHT HEAVYWEIGHT (175 Lbs / 79.38 Kgs) World Champion: DAVID HAYE U.K. World Champion: GUILLERMO JONES PAN World Champion: BEIBUT SHUMENOV KAZ Won Title: 11-07-09 Won Title: 09-27-08 Won Title: 01-29-10 Last Mandatory: Last Mandatory: 04-03-10 Last Mandatory: 07-23-10 Last Defense: 04-03-10 Last Defense: Last Defense: 07-23-10 INTERIM CHAMPION: STEVE HERELIUS FRA WBC: VITALY KLITSCHKO- IBF:WLADIMIR KLITSCHKO IBF: STEVE CUNNINGHAM - WBO: MARCO HUCK WBC: JEAN PASCAL - IBF: TAVORIS CLOUD WBC: KRZYSZTOF WLODARCZYK WBO: WLADIMIR KLITSCHKO WBO: JURGEN BRAEHMER 1. RUSLAN CHAGAEV (OC) UZB 1. VALERY BRUDOV (OC) RUS 1. GABRIEL CAMPILLO (OC) SPA 2. NICOLAY VALUEV RUS 2. ALEXANDER FRENKEL GER 2. CHRIS HENRY USA 3. DENNIS BOYTSOV (WBA I/C) RUS 3. ENZO MACCARINELLI U.K. 3. ALEKSY KUZIEMSKI (EBA) POL 4. ALEXANDER USTINOV (EBA) RUS 4. YOAN PABLO HERNANDEZ CUB 4. VYACHESLAV UZELKOV UKR 5. ODLANIER SOLIS (LAC) CUB 5. FRANCISCO PALACIOS P.R.
    [Show full text]
  • The COBIS Secondary Games Athletics Results
    The COBIS Secondary Games Athletics Results SCHOOL ATHLETICS POINTS COBIS POINTS British School Al Khubairat 1900 270 The British School in The Netherlands 1740 260 Dubai College 1610 250 Doha College 1380 240 St Catherine's British School in Athens 1140 230 St George's International School, Luxembourg 800 220 King’s College, The British School of Madrid (Soto) 770 210 Campion School Athens 730 200 British School Bahrain 680 190 British International School, Cairo 670 180 Temple School 660 170 New Cairo British International School 650 160 Rainbow International School 630 150 King's College, The British School of Alicante 590 140 Children's International School 450 130 King's College School, The British School of Madrid (La Moraleja) 430 120 British School of Bucharest 290 110 British International School of Riyadh 260 100 King's College, The British School of Murcia 220 90 Berlin British School 220 90 The Regent Secondary School Abuja 220 90 Nord Anglia International School, Hong Kong 210 60 British School of Gran Canaria 190 50 British Embassy School Ankara 190 50 Haileybury Almaty 190 50 International School of Moscow 120 20 Haileybury Astana 60 10 Boys 100 Metres NAME SCHOOL TIME POSITION TIMI ESAN British School Al Khubairat 12.24 1 St George's International School, ESLI OUWER KERK Luxembourg 12.82 2 TALAL KAZEROONI British School Bahrain 12.96 3 DENNIS NUGROHO Campion School Athens 13.01 4 AYOTOMIDE JOSHUA OMOTOSHO Temple School 13.27 5 TANIO BARRON British International School of Riyadh 13.69 6 MOHAMMAD SIRYON Rainbow International
    [Show full text]
  • Hackers Are Trying to Reignite Wannacry with Nonstop Botnet Attacks
    ANDY GREENBERG SECURITY 05.19.17 1:05 PM HACKERS ARE TRYING TO REIGNITE WANNACRY WITH NONSTOP BOTNET ATTACKS GETTY IMAGES OVER THE PAST year, two digital disasters have rocked the internet. The botnet known as Mirai knocked a swath of major sites off the web last September, including Spotify, Reddit, and The New York Times. And over the past week, the WannaCry ransomware outbreak crippled systems ranging from health care to transportation in 150 countries before an unlikely “kill-switch” in its code shut it down. Now a few devious hackers appear to be trying to combine those two internet plagues: They’re using their own copycats of the Mirai botnet to attack WannaCry’s kill-switch. So far, researchers have managed to fight off the attacks. But in the unlikely event that the hackers succeed, the ransomware could once again start spreading unabated. Under Siege Since the WannaCry ransomware worm began to fan out through the internet Friday, security researchers noticed a curious feature. When it infects a computer, it first reaches out to a certain random-looking web address, apparently as part of a check that it’s not running in a “sandbox” environment, which security researchers use to test malware samples safely. If WannaCry connects to a valid server at that specified domain, the ransomware assumes it’s under scrutiny, and goes dormant. Marcus Hutchins, a 22-year-old cybersecurity analyst for the security firm Kryptos Logic, spotted that trait last week, and immediately registered the web domain in WannaCry’s code. In doing so, he effectively neutered the malware, cutting short what would have otherwise been a far worse epidemic, and instantly becoming a minor celebrity in cybersecurity circles.
    [Show full text]