国产视频

In Short

(Almost) Never Pay the Ransom

Ransomeware
binarydesign / Shutterstock.com

This article in , a collaboration among , , and .

For more than two weeks now, Baltimore has been battling a major ransomware attack on its city government infrastructure. The city government鈥檚 email, voicemail, property tax portal, and water bill and parking ticket payment systems have all been affected, and . (To add insult to injury, the reported Thursday that 鈥淕mail accounts created by Baltimore officials as a workaround while the city recovers from the ransomware attack have been disabled because Google considers them business accounts that should be paid for, the mayor鈥檚 office said.鈥 Update, May 23, 2019: As of Thursday evening, Google says access to the Gmail accounts has been restored.) The cause of these problems is a relatively new strain of malware called RobbinHood, which, like other ransomware programs, encrypts infected systems so that they cannot be used or accessed until a payment is made and the attackers provide the necessary decryption key. It鈥檚 a deeply frustrating type of cybersecurity incident because it interrupts operations so completely. Even if a victim is perfectly prepared with full offline data backups, it still requires time and resources to reboot all of the infected computers.

So far, Baltimore鈥檚 response appears to have been admirable, if slow. It鈥檚 taking systems offline to prevent the malware from spreading and setting up an offline alternative to the online system for processing home sales, for instance. But on Monday, Baltimore Mayor Bernard Young hinted that he might be considering the worst possible response: giving in to the attackers鈥 demands for a payment of 13 bitcoins, or roughly $100,000.

Young didn鈥檛 say he would authorize the payment, but he showed signs of caving to the pressure, telling reporters, 鈥淚 am thinking. Right now, I say no, but in order to move the city forward? I might think about it. But I have not made a decision yet.鈥

From a financial perspective, it makes perfect sense that Young would consider acquiescing to the ransomers鈥 demands鈥攁fter all, it will cost the city far more than $100,000 to restore the systems that have been compromised. But long-term, that cost-benefit analysis looks very different. Every time a victim pays up in a situation like this, it simply allows the perpetrators to continue with this line of cybercrime鈥攁nd, more than that, encourages others to follow in their footsteps, because it reinforces the idea that this is a viable and lucrative business model.

Even Young just publicly stating that he is considering making such a payment may be enough to encourage future such attacks on Baltimore, by signaling to would-be attackers that the city has not ruled out the possibility.

When the city of Atlanta experienced a similar ransomware attack in 2018, media coverage noted the irony of the city鈥檚 spending to recover from the incident rather than paying the demanded $52,000. But while Atlanta鈥檚 recovery spending was perhaps excessive (the consultancy fees it paid for 鈥渋ncident response consulting鈥 and 鈥渃risis communications services鈥 were ludicrous), they had exactly the right idea in refusing to give in to the ransom demands.

There are multiple reasons it鈥檚 a bad idea鈥攂oth financially and ethically鈥攖o pay a ransom in . However frustrating the Baltimore situation may be right now, the inability to pay parking tickets or purchase a house does not reach the bar of, for instance, a hospital unable to administer care to patients because of ransomware.

From a purely self-interested perspective, there鈥檚 a real risk that Baltimore could pay and then find that the attackers do not actually restore their systems鈥攐r demand more money before doing so. According to a , roughly one in five ransomware victims who pay their attackers are still not able to retrieve their data. (As a sort of insurance against that risk, the Baltimore hackers have allegedly offered to decrypt three files at no charge to show they are 鈥渉onest,鈥 .)

Even if the RobbinHood perpetrators restore Baltimore鈥檚 computer systems upon receiving payment, that鈥檚 still no guarantee they won鈥檛 return to attack the city again in the future. They may even leave traces of malware or backdoors on the city鈥檚 systems to ensure their ability to do so. And even if those particular perpetrators move on to other targets, other attackers will know that the Baltimore government is a promising target, liable to give in to demands if the attack is sufficiently severe.

Beyond just opening itself up to more trouble and future ransom demands, Baltimore also stands to put the rest of us in greater danger by paying the ransom. For the most part, cybercriminals only continue to spread ransomware because it is a profitable business鈥攐ne found ransomware payments over a two-year period totaled more than $16 million.

So, yes, it鈥檚 important to make regular, automated backups of all your systems; it鈥檚 important to segment your network so that it鈥檚 hard for malware in one part to spread to all the others; it鈥檚 important to have offline alternatives to online systems; it鈥檚 important to be careful about suspicious websites and email attachments. But none of those things, on its own, is going to drive ransomware out of business. The only two things that have the potential to really dramatically drive down the frequency of ransomware attacks are a global crackdown on regulating cryptocurrency exchanges (which does not appear to be imminent) or a widespread refusal to pay ransoms that forces cybercriminals into another line of work to pay their bills.

No one should be paying ransoms, but public entities, like city governments and police departments, have a particular responsibility to protect the public good by doing the slow, hard, expensive work of restoring and securing their systems rather than taking the easy way out鈥攚hich will, in the end, only make everything harder.

More 国产视频 the Authors

(Almost) Never Pay the Ransom