Viw Magazine

Men's Weekly

.

  • Written by Roberto Musotto, Research Fellow in Cyber Security and Law, Edith Cowan University
Ransomware attacks are becoming increasingly complex, as hackers find creative ways to beat ordinary systems of defence. christiaancolen/flickr, CC BY

In recent weeks, Johannesburg’s computer network was held for ransom by a hacker group called Shadow Kill Hackers. This was the second time in three months a ransomware attack has hit South Africa’s largest city. This time, however, hackers didn’t pose the usual threat.

Rather than denying the city access to its data, the standard blackmail in a ransomware attack, they threatened to publish it online. This style of attack, known as leakware, allows hackers to target more victims in a single attack – in this case the city’s citizens.


Read more: What is ransomware and how to protect your precious files from it


The latest Johannesburg attack was the second leakware attack of this type ever recorded, and a similar attack could hit Australia soon. And although our current cyberattack defences are more advanced than many countries, we could be taken by surprise because of the unique way leakware operates.

A new plan of attack

During the Johannesburg attack, city employees received a computer message saying hackers had “compromised all passwords and sensitive data such as finance and personal population information”. In exchange for not uploading the stolen data online, destroying it and revealing how they executed the breach, the hackers demanded four bitcoins (worth about A$52,663) - “a small amount of money” for a vast city council, they said.

The hacker group operated a Twitter account, on which they posted a photo showing the directories they had access to. ShadowKillGroup/twitter

In this case, access to data was not denied. But the threat of releasing data online can put enormous pressure on authorities to comply, or they risk releasing citizens’ sensitive information, and in doing so, betraying their trust.

The city of Johannesburg decided not to pay the ransom and to restore systems on its own. Yet we don’t know whether the data has been released online or not. The attack suggests cybercriminals will continue to experiment and innovate in a bid to defeat current prevention and defence measures against leakware attacks.

This login screen message was displayed on computers in Johannesburg following the attack. pule_madumo/twitter

Another notable leakware attack happened a decade ago against the US state of Virginia. Hackers stole prescription drug information from the state and tried obtaining a ransom by threatening to either release it online, or sell it to the highest bidder.

When to trust the word of a cybercriminal?

Ransomware attack victims face two options: pay, or don’t pay. If they choose the latter, they need to try other methods to recover the data being kept from them.

If a ransom is paid, criminals will often decrypt the data as promised. They do this to encourage compliance in future victims. That said, paying a ransom doesn’t guarantee the release or decryption of data.

The type of attack experienced in Johannesburg poses a new incentive for criminals. Once the attackers have stolen the data, and have been paid the ransom, the data still has extractive value to them. This gives them duelling incentives about whether to publish the data or not, as publishing it would mean they could continue to extort value from the city by targeting citizens directly.


Read more: Ransomware attacks on cities are rising – authorities must stop paying out


In cases where victims decide not to pay, the solution so far has been to have strong, separate and updated data backups, or use one of the passkeys available online. Passkeys are decryption tools that help regain access to files once they’ve been held at ransom, by applying a repository of keys to unlock the most common types of ransomware.

But these solutions don’t address the negative outcomes of leakware attacks, because the “hostage” data is not meant to be released to the victim, but to the public. In this way, criminals manage to innovate their way out of being defeated by backups and decryption keys.

The traditional ransomware attack

Historically, ransomware attacks denied users access to their data, systems or services by locking them out of their computers, files or servers. This is done through obtaining passwords and login details and changing them fraudulently through the process of phishing.

It can also be done by encrypting the data and converting it to a format that makes it inaccessible to the original user. In such cases, criminals contact the victim and pressure them into paying a ransom in exchange for their data. The criminal’s success depends on both the value the data holds for the victim, and the victim’s inability to retrieve the data from elsewhere.

Some cybercriminal groups have even developed complex online “customer support” assistance channels, to help victims buy cryptocurrency or otherwise assist in the process of paying ransoms.

Trouble close to home

Facing the risk of losing sensitive information, companies and governments often pay ransoms. This is especially true in Australia. Last year, 81% of Australian companies that experienced a cyberattack were held at ransom, and 51% of these paid.

Generally, paying tends to increase the likelihood of future attacks, extending vulnerability to more targets. This is why ransomware is a rising global threat.


Read more: When it comes to ransomware, it's sometimes best to pay up


In the first quarter of 2019, ransomware attacks went up by 118%. They also became more targeted towards governments, and the healthcare and legal sectors. Attacks on these sectors are now more lucrative than ever.

The threat of leakware attacks is increasing. And as they become more advanced, Australian city councils and organisations should adapt their defences to brace for a new wave of sophisticated onslaught.

As history has taught us, it’s better to be safe than sorry.

Roberto Musotto received funding from H2020. He is affiliated with the Cyber Security Research Cooperative Centre (CSCRC).

Brian Nussbaum is an assistant professor at the College of Emergency Preparedness, Homeland Security and Cybersecurity (CEHC) at the University at Albany, a cybersecurity fellow with the think tank New America, and an affiliate scholar with the Center for Internet and Society (CIS) at Stanford Law School.

Authors: Roberto Musotto, Research Fellow in Cyber Security and Law, Edith Cowan University

Read more http://theconversation.com/hackers-are-now-targeting-councils-and-governments-threatening-to-leak-citizen-data-126190

Designing the Ideal Healthcare Environment with a Professional Medical Centre Fitout

When it comes to healthcare spaces, functionality, hygiene, and patient comfort take top priority. An intelligently designed medical centr...

Stay Comfortable Year-Round with Ducted Cooling Melbourne

When the temperature starts to rise, having a reliable and efficient cooling system becomes a priority. With unpredictable weather and sud...

Best Practices for Content Ownership and Tagging Across Departments

Image by kaboompics on Freepik The bigger and more complex content ecosystems grow, the more valuable ownership and tagging become. In ent...

Understanding Public Liability Insurance Australia: What You Need to Know

Image by rawpixel.com on Freepik The necessity of public liability insurance in Australia is that it acts as a financial safeguard for busi...

How HID Proximity Cards Improve Workplace Security Without Slowing Down Access

In today’s workplaces, security is non-negotiable, but so is speed. Companies are under pressure to protect their people, property, and ...

Unlock Business Insights Faster with Power BI Tools

In this digital age where data drives the consumer landscape, businesses are shipping huge amounts of data every day. To remain competit...

Why Split System Installation Is a Smart Choice for Home Climate Control

Temperature control is essential for comfort, and when it comes to efficient, versatile cooling and heating, a split system is one of the ...

The Ultimate Guide to Door Replacement: Everything You Need to Know

Image by freepik Sure, swapping out a door is a fairly easy task, but it requires careful consideration of options for materials, designs...

Common Web Development Issues Perth Businesses Face (and How Agencies Fix Them)

Image by freepik Let's be honest, in the bustling heart of Perth's business scene, a website that's not up to scratch is like trying to he...

Life With Clear Aligners: 10 Small Changes That Make a Big Difference

Image by tonodiaz on Freepik Clear aligners have transformed orthodontics, offering a nearly invisible way to straighten teeth without the...

Choosing the Right Hair Loss Treatment for Your Needs

Millions of people experience hair loss globally, and it can be a major cause of emotional discomfort and self-consciousness. Hair loss ca...

Cardboard Display Boxes: An Effective Solution for Retail Presentation

In the competitive world of retail, how products are presented can be just as important as the products themselves. Cardboard display boxe...

Why Hiring a Skilled Shopify Web Developer Can Transform Your Online Store

Shopify has become one of the most popular e-commerce platforms due to its ease of use, powerful features, and scalability. However, creat...

Selling a Home Left 1 in 3 Aussies in Tears, Survey Finds

New research on selling property found that more than 1 in 3 people who sold a property in the past two years admitted to crying at some poi...

Brisbane Motor Vehicle Accident Lawyers & Motorbike Accident Claims

Motorbike accidents in Brisbane can lead to severe injuries and complex legal challenges, given the vulnerability of riders on the road. F...

Jesse Martin, OAM Sets Sail Again with Portland Roads - Sailing the Whitsundays

Jesse Martin OAM shot to fame in 1999 as the world’s youngest sailor to circumnavigate the globe – solo, unassisted and non-stop. No...

Why Modern Roller Shutters Are the Perfect Solution for Your Home or Business

Whether you're looking to secure your home or make your business more energy-efficient, modern roller shutters are a smart choice. In this...

Everything You Need to Know About the EWPA Yellow Card

The EWPA Yellow Card is an important certification in the construction and workplace safety sectors. It plays a key role in ensuring worke...

From Residential to NDIS to Commercial: How Mr Window Cleaning Covers Every Window

Not all window cleaning jobs are created equal. A quiet suburban home, a bustling retail store, and a property under an NDIS plan each com...

How Timely Duct Inspections and Repairs Improve HVAC Efficiency

You have cranked up the air conditioning, but your home still feels unevenly cooled or stuffy. Sound familiar? Many homeowners jump straig...