The call, by New Zealand-headquartered Emsisoft. came in the wake of the death of a German woman as the direct result of a ransomware attack on a hospital in Duesseldorf last week. Last year, Emsisoft chief technology officer Fabian Wosar had said, somewhat prophetically: “The fact that there were no confirmed ransomware-related deaths in 2019 is simply due to good luck, and that luck may not continue into 2020. Governments and the health and education sectors must do better. ”
In a blog post, the company said it had already pointed out at the end of 2019 that the ransomware situation had reached crisis point.
But things had gone well beyond that, with more attacks on healthcare outfits, and an increasing number of ransomware gangs exfiltrating data before encrypting files from a victim's system, meaning that a dual threat was posed.
Another new development was the increase in ransoms being demanded, with the average sought being between US$150,000 (A$207,656) and US$250,000.
"The highest demand publicly reported is US$42 million; the highest demand not to be publicly reported is said to be in excess of US$1 billion," Emsisoft said. "For context, the average demand in 2018 was a little over US$5000. As a result of this increase, cyber criminals are better resourced and more motivated than ever."
The company said its conservative estimates were that more than US$25 billion would be paid out in ransom this year, with the global economic toll as high as US$170 billion.
The effects of ransomware attacks were many and varied:
- Personal information was exposed;
- Protected health information was exposed;
- Intellectual property was lost;
- Data was stolen from companies in the US Defence Industrial Base sector, including a contractor that supports the Minuteman III nuclear deterrent;
- Companies were forced into insolvency;
- Healthcare providers and other organisations were hit with class-action lawsuits;
- Sensitive information relating to child abuse cases and veterans’ PTSD claims was posted online;
- Sensitive information relating to ongoing police investigations was posted online;
- Prosecutions were dropped due to evidence being lost; and
- Emergency patients were turned away from hospitals, medical records were inaccessible and, in some cases, permanently lost, surgical procedures were cancelled, tests postponed and 911 services interrupted.
Emsisoft said collective action was called for in the case of ransomware and it could only be solved if everyone did the right thing. "In the case of ransomware, the right thing is not paying cyber criminals, and it’s time for governments to force organisations not to," the company said. "Making ransomware attacks unprofitable is the only way to stop them."
Likening security to a game of whack-a-mole, the firm said it was inevitable that not every mole would be whacked. "Nor will law enforcement agencies be able to reduce the number of attacks by improving the prosecution rate for cyber crime from its current level of between 0.05% and 0.3%. They may certainly be able to catch and prosecute more cyber criminals, but probably not to the extent that would be necessary in order to put a real dent in the numbers any time soon," it added.
Emsisoft ransomware threat researcher Brett Callow told iTWire: "To use an analogy, a group of military tanks is firing a constant barrage of shells (ransomware) at public and private sector organisations the world-over. The current strategy is to tell those organisations that they need to build shell-proof walls, along with some handy hints from governments as to how it can be done.
"This strategy is doomed to fail for multiple reasons. Not all organisations will have the budget or expertise to build and maintain a good wall; the company they hire to build it may not do a great job, some of the bricks may contain cracks or other vulnerabilities; new wall-piercing shells may be developed;, a malicious insider may detonate a shell within the wall, etc., etc.
"Put simply, it's unrealistic to believe that every organisation will achieve a good enough level of security to prevent these attacks. And while that continues to be the case, the attacks will continue.
"A far better strategy would be to remove incentive for the tanks to fire shells at all and, in the case of ransomware, that means cutting off the flow of cash. It's the only solution."