"

Ransomware

Module 13 explores ransomware, a type of malicious software that blocks access to computer systems or files until a ransom is paid. It highlights the significant and widespread impact of ransomware, which poses threats to individuals, businesses, and government entities. This module examines how ransomware infiltrates systems—often through phishing emails, malicious attachments, or compromised websites—and encrypts files, rendering them inaccessible without a decryption key.

The module discusses the financial motivation behind ransomware attacks and how cryptocurrencies like Bitcoin facilitate these transactions due to their pseudonymous nature. It categorizes different types of ransomware, including crypto-ransomware, locker ransomware, and doxware, and mentions notable strains such as WannaCry and NotPetya.

This module also emphasizes why businesses and institutions are prime targets due to their critical data and the potential for higher ransom payouts. It covers the severe consequences of ransomware attacks, including financial loss, reputational damage, and operational disruptions, particularly in critical sectors like healthcare.


Learning Objectives

After completing this module, you should be able to:

  • define ransomware and explain its impact on individuals, businesses, and government organizations.
  • identify common methods by which ransomware infects systems, including phishing emails and compromised websites.
  • describe the various types of ransomware, such as crypto-ransomware, locker ransomware, and doxware, and provide examples like WannaCry and NotPetya.
  • discuss the financial motivations behind ransomware attacks and the role of cryptocurrencies in facilitating ransom payments.
  • analyze the potential consequences of ransomware attacks, including financial losses, reputational damage, and disruptions to critical infrastructure.
  • evaluate different strategies to prevent and mitigate ransomware attacks, such as software updates, antivirus software, firewalls, and data backups.
  • examine the controversy surrounding the payment of ransom and its implications for future cyberattacks.
  • explore the evolving nature of ransomware tactics, including double extortion and Ransomware-as-a-Service (RaaS), and the importance of international collaboration in combating these threats.

Summary

Ransomware is a type of malicious software designed to block access to a computer system or files until a sum of money, or ransom, is paid to the attacker. It has become a significant and widespread cybersecurity threat, affecting individuals, businesses, and even government organizations.

Ransomware typically enters a system through phishing emails, malicious attachments, or compromised websites. Once inside, it encrypts files on the infected system, rendering them inaccessible without the decryption key.

Attackers use ransomware for financial gain. Victims are coerced into paying the ransom to regain access to their files. Cryptocurrencies, such as Bitcoin, are often demanded as payment due to their pseudonymous nature, making it more challenging to trace the transactions.

Ransomware comes in various forms, including crypto-ransomware, which encrypts files; locker ransomware, which locks the system; and doxware, which threatens to expose sensitive information. Notable ransomware strains include WannaCry, Ryuk, NotPetya, and Maze.

While individuals can be victims, businesses and institutions are often prime targets due to the potential for larger payouts and the critical nature of their data. Regularly updating software and systems can help patch vulnerabilities that ransomware exploits. Employing robust cybersecurity measures, such as firewalls and antivirus software, can help detect and prevent ransomware attacks. Regularly backing up data and storing it in a secure, offline location can mitigate the impact of an attack.

Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. Critical infrastructure, such as healthcare systems or government services, can be particularly vulnerable, with potential life-threatening implications.

Paying the ransom is a controversial topic. Some argue that paying encourages further attacks, while others argue that it may be the only way for some organizations to recover their data. Governments and law enforcement agencies work to track down and prosecute ransomware operators, but the international and decentralized nature of such attacks makes it challenging.

Ransomware tactics continue to evolve. Attackers may now engage in double extortion, where they not only encrypt files but also threaten to release sensitive information. Ransomware-as-a-Service (RaaS) allows less technically proficient individuals to launch ransomware attacks, further increasing the threat landscape.

Addressing the ransomware threat requires a multi-faceted approach involving technological defenses, user education, and international collaboration to track and prosecute cybercriminals. Organizations and individuals should remain vigilant to minimize the risk of falling victim to ransomware attacks.

Key Terms/Concepts

CISA
Cyber risk assessment
Crypto ransomware
Double extortion
Leakage or "extortionware"
Locker ransomware
Mobile device ransomware
Negotiators
Non-encrypting ransomware
Ransomware
Ransomware as a Service (RaaS)
Risk management

Read, Review, Watch and Listen

  1. Read Ransomware 101 (CISA, 2022)
  2. Read Preparing for a Cyber Incident: Preparing for a Cyber Incident – A Guide to Ransomware v 1.1 (U.S. Secret Service Cybercrime Investigations, 2022)
  3. Review Cybersecurity & Infrastructure Security Agency (CISA) – CISA Ransomware Guide (Oct. 2023).
    1. CISA Ransomware Gide – Overview and Updates
  4. Review the CISA website and learn about the agency and its mission.
  5. Review Ransomware Statistics, Trends and Facts for 2022 and Beyond (Cloudwards, March 2022)
  6. Watch What is Ransomware, How it Works and What You Can Do to Stay Protected:  (kasperskylab, Dec. 2016) [also embedded below]
  7. Watch Ransomware is booming as a business model: “It’s like eBay”  (CBS News, May 2021)
  8. Listen to Government Collaboration Needed To Prevent Ransomware Attacks

 

 

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Contact the professor with any course-related questions. Report any broken links to Dr. Ramirez-Thompson (thompsne@cod.edu).

Activity – Ransomware as a Service (Raas)

STOP!!

Note: This is a copy of the module’s activity that students find within Blackboard. For that reason, refer to the Activities page to submit your work for review.

Purpose

The purpose of this activity is to explore ransomware as a service (RaaS) and enhance students’ understanding of how it operates.

Overview

Ransomware as a Service (RaaS) is a business model where ransomware operators partner with affiliates, who pay to launch attacks created by the operators. RaaS adopts the same structure as the Software as a Service (SaaS) business model. In the past, successful hackers required coding skills, but with the rise of the RaaS model, this technical expertise has become less essential.

Instructions

  1. Read Ransomware as a Service: Enabler of Widespread Attacks  (TendMicro, Oct. 2021)
  2. Read WHAT IS RANSOMWARE AS A SERVICE (RAAS) AND HOW DOES IT WORK?  (BEFORECRYPT, last accessed May 2022)
  3. Review CISA’s I’ve Been Hit By Ransomware! (last accessed, November 2024).
  4. Watch DarkSide and other gangs exploit companies that aren’t prepared for ransomware attacks  (TechRepublic, July 2021) [also embedded below]

Answer the following questions:

  • Explain how RaaS makes it easier for those lacking technical skills to engage in a ransomware attack.
  • In your own words, explain why is the RaaS Business Model so popular?
  • Describe factors that might discourage ransomware operators from attacking certain targets. Make a concerted effort to integrate course-related terms/concepts in this and previous responses.
  • After finishing the readings and video, explain why RaaS makes ransomware more accessible to people with limited technical skills and how this shift impacts organizations and law enforcement.

Key Terms/Concepts

Concept Definition
RaaS subscription model A service where ransomware tools are sold or leased to affiliates who pay to use them.
Operators and affiliates Operators create and manage the ransomware. Affiliates buy access and carry out the attacks.
Limited technical expertise needed Affiliates no longer need coding skills because operators provide ready-made tools.
Profit-sharing A business arrangement where operators and affiliates split the ransom payments.
Dark web marketplaces Online spaces where RaaS kits, tools, and support services are bought and sold.
Double extortion Attackers encrypt data and also threaten to leak it unless the victim pays.
Cryptocurrency payments A preferred payment method because it helps attackers stay anonymous.
CISA response guidance Recommended steps for victims, such as isolating systems, reporting the incident, and avoiding ransom payments.
Expanded offender pool RaaS increases the number of attackers because entry barriers are much lower.

Supplemental Resources

Read, Review, Watch and Listen to all listed materials by the due date listed within the course LMS site.

Click HERE to report any needed updates, e.g., broken links.

 

definition

License

Icon for the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License

Computers and Criminal Justice Copyright © 2021 by Eric R. Ramirez-Thompson, PhD is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License, except where otherwise noted.