Some forms of cyber extortion are automated and not targeted at any specific victim. For example, “ransomware” refers to a type of malware that prevents users from accessing their systems unless, and until, a ransom is paid. Although variants of ransomware operate differently, many encrypt the contents of a victim’s hard drive using asymmetric encryption in which the decryption key is stored on the attacker’s server and is available only after payment of the ransom. Victims typically discover the ransomware when they receive an on-screen message instructing them to transfer funds using an electronic currency, such as bitcoin, in order to receive the decryption key and access to their files. “CryptoLocker” is the most famous ransomware family and first appeared in 2013.
What to think about if your organization is impacted by ransomware:
- Is the ransomware designed to export data before encrypting it?
- If so, did the impacted data contain any personally identifiable information that might implicate a data breach notification statute?
- Is it possible for your organization to recover the impacted files using backup systems?
- Is the variant of ransomware involved associated with a known criminal enterprise?
- If your organization were to pay the ransom demand, is it likely that the recipient of the funds may be associated with terrorism or located in a restricted country?
- Is cyber extortion and/or ransomware covered under your cyber insurance policy?
The following provides a snapshot of information concerning ransomware.
Click here to view table.