Again a ransomware outbreak on the news.
May I say I am not surprised at all?
And may I say that the media coverage has been ridiculous and instead of presenting the event as something that should highlight the incompetent behaviour of managers targeted by this issue they claims about “cyberattack” which is a completely different thing.
And yet people asking why? how come? how this can be possible? again really?
We know that CyberSecurity is always a side though from most of the management no matter where. The proof, beside the claims from CEO, IT Managers and generally speaking CxO, is always there, on the data of the malware spreading.
Today is wannacry (wannacryptor or whatever you want to call it), tomorrow will be something else.
But for once let us try to be serious on those stuff….
First dig it a little on the specific here:
not ask ourselves a few questions.
Why Ransomware Strike?
ransomware are becoming increasingly common. The spread is due to 3 main reasons:
- a ransomware is a damn easy peace of code to write, because it leverage the read, write and modify rights to access files so does need any Rocket Science behind to make damage.
- the cryptocurrency gave to ransomware what was needed, the possibility to monetize the attack in a fairly secure way. Before bitcoin and co was quite difficult to make money transfers without being caught…
- the security level of the IT in the world is still at the caveman age surrounded and filled by incompetence and a great deal of stupidity.
Let us be clear, the patch to close the vulnerability used by this last piece of ransomware was available since a few… but it is quite interesting to notice how, as of now, patching is still considered a minor activity in many IT infrastructures.
Who is responsible of this situation? Of course of a higher management blind and irresponsible that does not even think for a moment (till it is too late) that nowadays we all depend of our digital infrastructure.
the infection start with a mail or a usb infected key…. really?
How long we will avoid to train properly our workforce to teach them how to deal with email and attachment?
the infection leveraged a vulnerability on windows that were already covered by a patch from Microsoft… really?
How long we will consider patching the systems a useless activity or, at least, a minor one?
Sad truth sometimes would be easy to protect from those outbreak just simply implementing a minimum sound IT system, good backup policies, good patch management and … but we are telling those things since the very beginning of time.
The whole point is that till we will not manage the security aspects of our digital infrastructure in a serious and comprehensive way we will be exposed to this spread of junk again and again. And the more we rely on computers and digital infrastructure the more we will become targets.
So when you ask yourself who is to blame for this or other outbreaks, who is behind this worldwide attack?
Blame our stupidity.
Next could be worse.
- NSA tools at center of ransomware attacks hitting UK hospitals: report (mashable.com)
- Researcher finds ‘kill switch’ for cyberattack ransomeware (japantimes.co.jp)
- Telefonica WannaCry Ransomware: One Of Spain’s Largest Telecom Companies Hit By Cyberattack (ibtimes.com)
- Intuit Confirms Information Requests From Government (turbotax.intuit.com)
- Intuit’s Fight Against Tax Fraud (turbotax.intuit.com)
- Ransomware based on leaked NSA tools spreads to dozens of countries (techcrunch.com)
- 38% of consumers affected by ransomware pay up (helpnetsecurity.com)
- WannaCry Ransomware: Webroot protects you. (webroot.com)
- British 22-year-old jumped around in excitement after finding way to stop global cyber attack (telegraph.co.uk)
- How to protect yourself from ransomware (telegraph.co.uk)