financetom
Technology
financetom
/
Technology
/
Explained: Why ransomware is so dangerous and hard to stop
News World Market Environment Technology Personal Finance Politics Retail Business Economy Cryptocurrency Forex Stocks Market Commodities
Explained: Why ransomware is so dangerous and hard to stop
Jun 3, 2021 2:19 AM

Recent high-profile ransomware attacks on the world's largest meat-packing company and the biggest US fuel pipeline have underscored how gangs of extortionist hackers can disrupt the economy and put lives and livelihoods at risk. Last year alone in the US, ransomware gangs hit more than 100 federal, state, and municipal agencies, up/wards of 500 health care centers, 1,680 educational institutions, and untold thousands of businesses, according to the cybersecurity firm Emsisoft. Dollar losses are in the tens of billions. Accurate numbers are elusive. Many victims shun reporting, fearing the reputational blight.

More recent known targets include a Massachusetts ferry operator, the Irish health system, and the Washington, D.C., police department. But the broadly disruptive hacks on Colonial Pipeline in the US in May and Brazilian meat processor JBS SA this week have drawn close attention from the White House and other world leaders, along with heightened scrutiny of the foreign safe havens where cybercriminal mafias operate.

WHAT IS RANSOMWARE? HOW DOES IT WORK?

Ransomware scrambles the target organizations data with encryption. The criminals leave instructions on infected computers for negotiating ransom payments. Once paid, they provide decryption keys for unlocking those files.

Ransomware crooks have also expanded into data-theft blackmail. Before triggering encryption, they quietly copy sensitive files and threaten to post them publicly unless they get their ransom payments. That can present problems even for companies that diligently back up their networks as a hedge against ransomware, since refusing to pay can incur costs far greater than the ransoms they might have negotiated.

HOW DO RANSOMWARE GANGS OPERATE?

The criminal syndicates that dominate the ransomware business are mostly Russian-speaking and operate with near impunity out of Russia and allied countries. Though barely a blip three years ago, the syndicates have grown in sophistication and skill. They leverage dark web forums to organize and recruit while hiding their identities and movements with sophisticated tools and cryptocurrencies like Bitcoin that make payments and their laundering harder to track.

Some top ransomware criminals fancy themselves software service professionals. They take pride in their customer service, providing help desks that assist paying victims in file decryption. And they tend to keep their word. They have brands to protect, after all.

The business is now highly specialized. An affiliate will identify, map out and infect targets using ransomware that is typically rented from a ransomware-as-a-service provider. The provider gets a cut of the payout; the affiliate normally takes more than three-quarters.

Other subcontractors may also get a slice. Those can include the authors of the malware used to break into victim networks and the people running so-called bulletproof domains behind which the ransomware gangs hide their command-and-control servers. Those servers manage the remote sowing of malware and data extraction ahead of activation, a stealthy process that can take weeks.

WHY DO RANSOMS KEEP CLIMBING? HOW CAN THEY BE STOPPED?

Colonial Pipeline confirmed that it paid USD 4.4 million to the gang of hackers who broke into its computer systems last month.

The FBI discourages paying ransoms, but a public-private task force including tech companies and US, British and Canadian crime agencies says it would be wrong to try to ban ransom payments altogether. That’s largely because ransomware attackers continue to find sectors and elements of society that are woefully underprepared for this style of attack.

The task force recognizes that paying up can be the only way for an afflicted business to avoid bankruptcy. Worse, the sophisticated cybercriminals often have done their research and know a victims cybersecurity insurance coverage limit. Theyve been known to mention it in negotiations.

That degree of criminal savvy helped drive average ransom payments to more than USD 310,000 last year, up 171 percent from 2019, according to Palo Alto Networks, a task force member.

WHAT’S BEING DONE ABOUT IT?

President Joe Biden signed an executive order in May meant to strengthen US cybersecurity defenses, mostly in response to Russias hacking of federal agencies and interference in US politics. But headline-grabbing ransomware attacks on private companies have started to dominate the cybersecurity conversation as Biden prepares for a June 16 summit with his Russian counterpart Vladimir Putin.

White House principal deputy press secretary Karine Jean-Pierre said this week that the ransom demand of JBS meat came from a criminal organization likely based in Russia. She said the White House is engaging directly with the Russian government” and ”delivering the message that responsible states do not harbor ransomware criminals.

The new industry task force set up to combat ransomware says it’s important to have concerted diplomatic, legal, and law enforcement cooperation with key allies.

Ransomware developers and their affiliates should be named and shamed though they’re not always easy to identify and regimes that enable them punished with sanctions, its report urges.

It calls for mandatory disclosure of ransom payments and a federal response fund to provide financial assistance to victims in hopes that, in many cases, it will prevent them from paying ransoms. And it wants stricter regulation of cryptocurrency markets to make it more difficult for criminals to launder ransomware proceeds.

The task force also calls for something potentially controversial: amending the US Computer Fraud and Abuse Act to let private industry actively block or limit online criminal activity, including of botnets, the networks of hijacked zombie computers that ransomware criminals use to sow infections.

Comments
Welcome to financetom comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Show More Comments
Related Articles >
Align Technology Announces Invisalign® System With Mandibular Advancement Featuring Occlusal Blocks for Class II Skeletal and Dental Correction
Align Technology Announces Invisalign® System With Mandibular Advancement Featuring Occlusal Blocks for Class II Skeletal and Dental Correction
Nov 24, 2025
Offers an Innovative Treatment Option for Class II Skeletal Malocclusion in Kids and Teenage Patients While Simultaneously Straightening their Teeth MANILA, Philippines--(BUSINESS WIRE)-- Align Technology, Inc. ( ALGN ) , a leading global medical device company that designs, manufactures, and sells the Invisalign® System of clear aligners, iTero™ intraoral scanners, and exocad™ CAD/CAM software for digital orthodontics and restorative...
Nokia introduces MantaRay SON to NTT DOCOMO’s multi-vendor 5G network
Nokia introduces MantaRay SON to NTT DOCOMO’s multi-vendor 5G network
Nov 24, 2025
Nokia introduces MantaRay SON to NTT DOCOMO’s multi-vendor 5G network Nokia and NTT DOCOMO partner to revolutionize 5G Operations in Japan with MantaRay SONAutonomous solution enhances 5G network efficiency, customer experience, and operational cost savings in Japan 25th November 2025 Espoo, Finland – Nokia today announced its collaboration with Japan’s NTT DOCOMO, INC. (“DOCOMO”) to deploy its autonomous MantaRay SON...
OKI Launches Projection Assembly SystemTM in Southeast Asia
OKI Launches Projection Assembly SystemTM in Southeast Asia
Nov 24, 2025
- Expanding support for manufacturing site operations globally, starting in Thailand and Indonesia - TOKYO--(BUSINESS WIRE)-- OKI launched its Projection Assembly SystemTM (Note 1) in Thailand and Indonesia, which supports assembly and quality inspection processes, driving the digital transformation (DX) of manufacturing sites on November 25, 2025. The system combines projector-based task guidance with image sensing technologies to help...
The (ETHUSD) is attacking key resistance- Analysis- 25-11-2025
The (ETHUSD) is attacking key resistance- Analysis- 25-11-2025
Nov 24, 2025
The (ETHUSD) price declined in its last intraday trading, to gather its bullish momentum that may help it to breach the current resistance at $2,950, attempting to surpass the negative pressure of EMA50, amid the dominance of bullish corrective wave on the intraday basis, supported by the emergence of the positive signals on the relative strength indicators, but the bearish...
Copyright 2023-2025 - www.financetom.com All Rights Reserved