* Keep all systems up to date with the latest patches.
* Have a DR plan and test it regularly.
* Make frequent backups, verify them, and keep them offline.
Historically organizations have been so bad at backups that the advice has been to automate them as much as possible, to try to ensure that a recent backup at least exists. But I am increasingly of the opinion that the next level of backup maturity is to dial back on the automation and invest manual effort in airgapping the backups.
Fully automated backups are necessarily part of the software attack surface.
If you have to hire more ops people to rotate tapes by hand every day, that will have to be a cost of doing business safely.
Companies often have IAM/ssh/keys all over the place. If you centralize things to IAM you can lower permissions based on their last use. EG. A frontend dev needs access to GCP to configure things in firebase. This frontend developer hasn't used these IAM permissions in 3 months. This persons IAM permissions should automatically have these permissions removed.
Probably one of the easiest yet most powerful thing to implement in cloud sec ops AND probably never done.
https://cloud.google.com/iam/docs/recommender-managing
Example script to automate it: https://github.com/james-ransom/auto-apply-gcp-iam-recommend...
The problem is that they are getting $1M payouts on a $10k budget. That is a staggering ROI of 100! If you could magically improve the security of every system on the market by 1000% you would wipe out the current forms of attack, but it would still be insanely profitable to run $100k attacks to get $1M payouts. To actually stop attacks from continuing to escalate exponentially at their recent pace of >100% per year that any VC darling would be proud to achieve, you need to make it cost more on average to attack than they can get.
We are literally orders of magnitude away from that in the average case at current returns. And even worse returns per attack keep escalating. Just 4 years ago during WannaCry the ask was $300 per computer which can be a painful chunk of change for an individual which is who most ransomware attacks were targeting before, but nothing for any company. They were attacking companies for ~$10k payout and still making enough money to expand their operations doing it.
As the focus has moved to industry the payouts have increased exponentially since there are many companies whose operations are so valuable that they are willing to pay millions or tens of millions or even hundreds of millions per day. At those payouts there are 0 commercial IT systems that can make attacks unprofitable. So, when those attacks become the ones with the best risk-adjusted ROI you better believe they will occur. And when the attackers have a $10M budget simple defenses and techniques that worked on $10k attacks will not work because the attackers will have literally 100,000% more resources at their disposal in much the same way that defenses that work against a rock thrown at 10 m/s do not work against a ICBM traveling 1000x faster at mach 30.
So yes, simple mitigations would stop the simple successful attacks now, but do not solve the actual problem that it would still be profitable to attack even if they were all implemented everywhere since payouts are so much higher than cost.
It’s easier to get it right when you can put your arms around the whole thing.
* Also ensure your Production and DR do not use the same automation, or that there is full segmentation in your automation so that if automation goes sideways, or is compromised, your Production and DR are not simultaneously blown away or encrypted.
* If you can't keep backups offline, at least write them to a write-only destination and/or have an enforced vaulting policy that keeps {n} copies in multiple locations and can't even be deleted by super-users. Deletion must require multiple VP's using MFA to log into a thing and "turn a key" so to speak.
Is there a service that could regularly fetch data from s3 or even connect to postgres, and regularly send a physical copy of the data by mail?
Does it make sense to offer airgapped backups as a service to smaller companies? Over mail?
That gives you quick retrieval of of-site backups.
The only reason I haven't done something like that for all my personal data is that tape machines are terribly expensive. Tape drives are pretty cheap.
Can we please call it The Department of Redundancy Department?
Jokes aside it seems that the DR, backups, and system images (i.e. installation including patches) that you mention are all related and it could make sense to dedicate a role or team to it. We split out things like networking and security into their own teams when we want them to be taken seriously.
For recovery, you need more accessible backups. And to test your backup plan.
Was it a malicious email attachment that propagated through unsecured networks or outdated OS versions? And what data was encrypted? Are we talking regular excel files or actual databases?
It would be interesting to have some more detail or case studies so others could know how to fortify infection points and limit the blast radius of their own systems.
Regular patching is necessary hygiene for corporate IT, but often the department is understaffed, or frankly told by management to prioritize shiny things instead.
I would guess the easiest way is to phish a login to the corp VPN or to send an email with a malicious attachment to give the attacker something inside the corp firewall as a place to start their port scan of the internal network and begin their attacks.
These guys do a lot of honeypot writeups that are pretty consistent with my experience: https://thedfirreport.com/
A lot of places that get crippled by ransomware have outdated or underfunded IT departments (health care is particularly bad at this), so that kind of insight is barely on the table at the best of times.
Even when a postmortem is eventually done, companies don't want to have to admit the attack could have been prevented, or at least minimized, with better investment in security.
I’m not sure what point you are trying to make.
Ransom: Another great "feature" of difficult-to-trace personal gold coinage
What you're actually saying is:
Bad thing: Another great "feature" of any kind of positive development in personal sovereignty
Or
Bad thing: Another great "feature" of any kind of progress
---
Progress comes with pitfalls. Sharp knives prepare food and also kill people.
You argument effectively reduces to: never innovate.
I think we're perfectly allowed to discuss whether we think a particular kind of change is a good or bad thing.
You chose to reduce it to that. There is no need to reduce every argument to its black and white extreme, although that is the easiest interpretation.
Bitcoin in particular requires truly ridiculous amounts of compute and has made hacking a far more profitable enterprise than before.
There are already digital currencies tackling the first problem, the 2nd could potentially also be solved.
So a more charitable interpretation might be, more innovation is needed to get digital currencies right.
See how silly you sound?
the ransom part, at the scale possible with cryptocurrency, is new.
those who sound "silly" are the ones elaborately pretending that this formerly obscure class of electronic extortion didn't suddenly explode into an epidemic with the concomitant rise of cryptocurrency.
Sure, someone might get more expensive insurance quotes or made fun of for having ADHD, HIV or acne treatment...
But I think that would be outweighed by health benefits by combing the data for correlations and causations that have been unidentified in the past. Being able to shut down things that are poisoning millions of people, but to such a minor extent it isn't immediately obvious, would have a big benefit for society.
Let's say I'm a Saudi National, who worked in the United States. While there I disclosed to a doctor that I'm gay. I return to Saudi Arabia. This document gets leaked. How exactly does this make the world a better place?
Summary of possible outcomes:
https://en.wikipedia.org/wiki/LGBT_rights_in_Saudi_Arabia#Su...
Notice the first line:
Same-sex sexual activity: Fines, prison time up to life, and capital punishment.
If someone has to pay a bit more for insurance or whatever, that may not sound like a big deal and also morally justifiable if you assume someone is always willing and able to evaluate risk accurately.
However, some diagnoses are treated as "unknown unknowns" rather than quantifiable risks. In that case, it's likely that there will simply be nobody to accept them at all.
The discrepancy between this treatment of a risk as effectively infinite, because nobody will take it on, versus the fact that it is really finite, constitutes economic destruction that would be caused by the disclosure of the diagnosis.
Right now there are restricted circumstances where things have to be disclosed. But it's relatively tolerable because it's limited. For instance, you might not be able to get life insurance, but at least you can hold a job, have health insurance, live where you like, etc.
Taking all that away from millions of people seems not a lot kinder than just liquidating them.
Size of an organization is not a good proxy for quality of security. Evidence: Colonial Penn, the DC Metro Police Department, Experian, Target, etc...
They're hiring consultants to confirm that they've met the requirements of some checklist, which requirements may include "have a plan to fix this obvious problem.... someday. You do? OK, then you're fine". That's much cheaper and is 100% management-class controlled.
You would likely end up with better security. Would it be good enough to prevent breaches? Doubt it.
You can practice things that make recovery fast and reduce the impact of breaches though. Isolate data, encrypt it, only grant necessary access, have robust backups and test recovery regularly. These things take time and money though, and most companies are unwilling to do them sufficiently.
Happens with military/infrastructure spending all the time - get a cheap initial quote and then get screwed long-term.
And with covid. Govs didn't have the courage to lock down early and fast / close borders and cost themselves a lot of money in the short term.
https://m.independent.ie/irish-news/serious-and-sophisticate...
The information surrounding the current pandemic within Ireland is heavily scewed in one direction, there is no room for any questions, without being labled as something. What if, someone decided to check the information for themselves. Just a thought, [removes crazy hat made from tinfoil]
And with ransomware you don't have to hear the crying of your victims.
Plus if you show mercy on someone people can identify with, like a single mom barely getting by, you can go on draining pensioner's bank accounts like your fucking Robinhood.
The less data is actually leaked and sold the better, of course, but societies and especially politicians don't seem to learn that easily.
That, and all the high security cloud hosting in the world will not help the most commonly exploited security issues: unpatched wordpress plugins, world readable storage buckets, poorly secured privileged accounts, ransomware, phishing... A shoddily managed on-prem enteprise IT infra moved into the cloud will be just this: a poorly managed AWS infra, just as exploitable as before, but now also 10x as expensive to run.
However, the latter requires a huge mindset and experience shift from the very top of the organisation. And groups and individuals of that organisation having strong interest in their survivability are, of course, not going to change that.
Cloud documents like Word and Google docs seem less susceptible, as writing a content parser for each file format to encrypt it would be a higher bar. Or am I missing something there?
It also suggests there could be a market for cryptocurrency futures as a form of insurance. This is one extreme situation where you are forced to buy a currecy at market prices, but I suspect it's the first of more.
The entire technology industry is built on a foundation of limited liability and has a tradition of being ok with defects (eh, it's a small bug). When do we get hardware that is guaranteed to perform and be safe, operating systems, languages and compliers that are safe? It's going to be very difficult to deal with liability in a strict sense. Who's at fault? The OS that had a bug, the library that made the syscall, the code that called the library, the script that ran the program, the network router that allowed the egress, or the user that pushed the button? (edit: fixed typo)
$ curl -sI https://imgs.xkcd.com/comics/voting_software.png | grep Modified
Last-Modified: Wed, 08 Aug 2018 16:59:09 GMT2. Terrorism has similarly precise definitions, usually along the lines of "the act has to be in pursuit of political aims". Just because its a big and important target does not make it political, ransomware is an economic crime.
For anyone with time on their hands, the "Talinn Manual" has a lot of detail on this:
https://www.kobo.com/ie/en/ebook/tallinn-manual-2-0-on-the-i...
This is not true. For example major countries like the United States and the United Kingdom are not nation states but can still commit acts of war under international law.