Malware Devil

Wednesday, November 4, 2020

Why Paying to Delete Stolen Data is Bonkers

Companies hit by ransomware often face a dual threat: Even if they avoid paying the ransom and can restore things from scratch, about half the time the attackers also threaten to release sensitive stolen data unless the victim pays for a promise to have the data deleted. Leaving aside the notion that victims might have any real expectation the attackers will actually destroy the stolen data, new research suggests a fair number of victims who do pay up may see some or all of the stolen data published anyway.

The post Why Paying to Delete Stolen Data is Bonkers appeared first on Security Boulevard.

Read More

The post Why Paying to Delete Stolen Data is Bonkers appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/why-paying-to-delete-stolen-data-is-bonkers-2/?utm_source=rss&utm_medium=rss&utm_campaign=why-paying-to-delete-stolen-data-is-bonkers-2

Why Paying to Delete Stolen Data is Bonkers

Companies hit by ransomware often face a dual threat: Even if they avoid paying the ransom and can restore things from scratch, about half the time the attackers also threaten to release sensitive stolen data unless the victim pays for a promise to have the data deleted. Leaving aside the notion that victims might have any real expectation the attackers will actually destroy the stolen data, new research suggests a fair number of victims who do pay up may see some or all of the stolen data published anyway.

The findings come in a report today from Coveware, a company that specializes in helping firms recover from ransomware attacks. Coveware says nearly half of all ransomware cases now include the threat to release exfiltrated data.

“Previously, when a victim of ransomware had adequate backups, they would just restore and go on with life; there was zero reason to even engage with the threat actor,” the report observes. “Now, when a threat actor steals data, a company with perfectly restorable backups is often compelled to at least engage with the threat actor to determine what data was taken.”

Coveware said it has seen ample evidence of victims seeing some or all of their stolen data published after paying to have it deleted; in other cases, the data gets published online before the victim is even given a chance to negotiate a data deletion agreement.

“Unlike negotiating for a decryption key, negotiating for the suppression of stolen data has no finite end,” the report continues. “Once a victim receives a decryption key, it can’t be taken away and does not degrade with time. With stolen data, a threat actor can return for a second payment at any point in the future. The track records are too short and evidence that defaults are selectively occurring is already collecting.”

Image: Coveware Q3 2020 report.

The company said it advises clients never to pay a data deletion ransom, but rather to engage competent privacy attorneys, perform an investigation into what data was stolen, and notify any affected customers according to the advice of counsel and application data breach notification laws.

Fabian Wosar, chief technology officer at computer security firm Emsisoft, said ransomware victims often acquiesce to data publication extortion demands when they are trying to prevent the public from learning about the breach.

“The bottom line is, ransomware is a business of hope,” Wosar said. “The company doesn’t want the data to be dumped or sold. So they pay for it hoping the threat actor deletes the data. Technically speaking, whether they delete the data or not doesn’t matter from a legal point of view. The data was lost at the point when it was exfiltrated.”

Ransomware victims who pay for a digital key to unlock servers and desktop systems encrypted by the malware also are relying on hope, Wosar said, because it’s also not uncommon that a decryption key fails to unlock some or all of the infected machines.

“When you look at a lot of ransom notes, you can actually see groups address this very directly and have texts that say stuff along the lines of, Yeah, you are fucked now. But if you pay us, everything can go back to before we fucked you.’”

Read More

The post Why Paying to Delete Stolen Data is Bonkers appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/why-paying-to-delete-stolen-data-is-bonkers/?utm_source=rss&utm_medium=rss&utm_campaign=why-paying-to-delete-stolen-data-is-bonkers

IAM: A Critical Element of Corporate Risk Literacy

Risk is relative. What one person perceives is a significant risk may be observed simply as irritation to another. Others […]

The post IAM: A Critical Element of Corporate Risk Literacy appeared first on Sonrai Security.

The post IAM: A Critical Element of Corporate Risk Literacy appeared first on Security Boulevard.

Read More

The post IAM: A Critical Element of Corporate Risk Literacy appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/iam-a-critical-element-of-corporate-risk-literacy/?utm_source=rss&utm_medium=rss&utm_campaign=iam-a-critical-element-of-corporate-risk-literacy

DEF CON 28 Safe Mode ICS Village – Dor Yardeni’s & Mike Lemley’s ‘Vulnerability Discovery Tips For Surviving’

Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization’s DEFCON 28 SAFE MODE Conference, and on the DEF CON YouTube channel. Enjoy!

Permalink

The post DEF CON 28 Safe Mode ICS Village – Dor Yardeni’s & Mike Lemley’s ‘Vulnerability Discovery Tips For Surviving’ appeared first on Security Boulevard.

Read More

The post DEF CON 28 Safe Mode ICS Village – Dor Yardeni’s & Mike Lemley’s ‘Vulnerability Discovery Tips For Surviving’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/def-con-28-safe-mode-ics-village-dor-yardenis-mike-lemleys-vulnerability-discovery-tips-for-surviving/?utm_source=rss&utm_medium=rss&utm_campaign=def-con-28-safe-mode-ics-village-dor-yardenis-mike-lemleys-vulnerability-discovery-tips-for-surviving

Prepare for the Unexpected: Costs to Consider in Security Budgets

Organizations that update business models to include cybersecurity as part of a strategic planning process may be able to better withstand unexpected disruptions.

The post Prepare for the Unexpected: Costs to Consider in Security Budgets appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/prepare-for-the-unexpected-costs-to-consider-in-security-budgets/?utm_source=rss&utm_medium=rss&utm_campaign=prepare-for-the-unexpected-costs-to-consider-in-security-budgets

Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks

As a mechanism to offload PCI risks, many retailers are now using third-party credit card processing for their online transactions. The retailer’s benefit is they are no longer handling the credit card data, thereby reducing the cardholder footprint (and PCI exposure). The potential drawback to this approach is that now a third-party controls that data. […]

The post Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks appeared first on Cequence.

The post Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks appeared first on Security Boulevard.

Read More

The post Tales from the Front Lines: How Third-Party APIs Simplify Enumeration Attacks appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/tales-from-the-front-lines-how-third-party-apis-simplify-enumeration-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=tales-from-the-front-lines-how-third-party-apis-simplify-enumeration-attacks

XKCD ‘Election Impact Score Sheet’

via the comic delivery system monikered Randall Munroe resident at XKCD !

via the comic delivery system monikered Randall Munroe resident at XKCD!

Permalink

The post XKCD ‘Election Impact Score Sheet’ appeared first on Security Boulevard.

Read More

The post XKCD ‘Election Impact Score Sheet’ appeared first on Malware Devil.



https://malwaredevil.com/2020/11/04/xkcd-election-impact-score-sheet/?utm_source=rss&utm_medium=rss&utm_campaign=xkcd-election-impact-score-sheet

Tuesday, November 3, 2020

Successfully and Securely Working From Anywhere | Avast

I recently had the opportunity to speak at the Women in Business event, which was held virtually this year. I spoke about the experience of quickly and securely moving Avast — a global company with nearly 2,000 employees based in countries around the world — to a fully remote working environment.

The post Successfully and Securely Working From Anywhere | Avast appeared first on Security Boulevard.

Read More

The post Successfully and Securely Working From Anywhere | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/successfully-and-securely-working-from-anywhere-avast-5/?utm_source=rss&utm_medium=rss&utm_campaign=successfully-and-securely-working-from-anywhere-avast-5

Successfully and Securely Working From Anywhere | Avast

I recently had the opportunity to speak at the Women in Business event, which was held virtually this year. I spoke about the experience of quickly and securely moving Avast — a global company with nearly 2,000 employees based in countries around the world — to a fully remote working environment.

The post Successfully and Securely Working From Anywhere | Avast appeared first on Security Boulevard.

Read More

The post Successfully and Securely Working From Anywhere | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/successfully-and-securely-working-from-anywhere-avast-4/?utm_source=rss&utm_medium=rss&utm_campaign=successfully-and-securely-working-from-anywhere-avast-4

Successfully and Securely Working From Anywhere | Avast

I recently had the opportunity to speak at the Women in Business event, which was held virtually this year. I spoke about the experience of quickly and securely moving Avast — a global company with nearly 2,000 employees based in countries around the world — to a fully remote working environment.

The post Successfully and Securely Working From Anywhere | Avast appeared first on Security Boulevard.

Read More

The post Successfully and Securely Working From Anywhere | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/successfully-and-securely-working-from-anywhere-avast-3/?utm_source=rss&utm_medium=rss&utm_campaign=successfully-and-securely-working-from-anywhere-avast-3

Successfully and Securely Working From Anywhere | Avast

I recently had the opportunity to speak at the Women in Business event, which was held virtually this year. I spoke about the experience of quickly and securely moving Avast — a global company with nearly 2,000 employees based in countries around the world — to a fully remote working environment.

The post Successfully and Securely Working From Anywhere | Avast appeared first on Security Boulevard.

Read More

The post Successfully and Securely Working From Anywhere | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/successfully-and-securely-working-from-anywhere-avast-2/?utm_source=rss&utm_medium=rss&utm_campaign=successfully-and-securely-working-from-anywhere-avast-2

Successfully and Securely Working From Anywhere | Avast

I recently had the opportunity to speak at the Women in Business event, which was held virtually this year. I spoke about the experience of quickly and securely moving Avast — a global company with nearly 2,000 employees based in countries around the world — to a fully remote working environment.

The post Successfully and Securely Working From Anywhere | Avast appeared first on Security Boulevard.

Read More

The post Successfully and Securely Working From Anywhere | Avast appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/successfully-and-securely-working-from-anywhere-avast/?utm_source=rss&utm_medium=rss&utm_campaign=successfully-and-securely-working-from-anywhere-avast

5 Mistakes CISOs Make in Their Board Presentations

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain your strategic goals and plan, and answer questions; all with a largely non-technical audience. This can be quite challenging. Your presentation needs to …

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Security Boulevard.

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/5-mistakes-cisos-make-in-their-board-presentations-5/?utm_source=rss&utm_medium=rss&utm_campaign=5-mistakes-cisos-make-in-their-board-presentations-5

Community Q&A With Financial Crime Analysts

We received a ton of great questions from our webinar on financial crime investigations and are putting up our Q&A with industry attendees

The post Community Q&A With Financial Crime Analysts appeared first on Security Boulevard.

Read More

The post Community Q&A With Financial Crime Analysts appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/community-qa-with-financial-crime-analysts-6/?utm_source=rss&utm_medium=rss&utm_campaign=community-qa-with-financial-crime-analysts-6

MSFT X GITHUB: Cruft Thereof

Microsoft Corporation’s Github is now laboring under the cruft that is Microsoft… Image Source: Twitter, via bleepingcomputer.com

Microsoft Corporation’s Github is now laboring under the cruft that is Microsoft… Image Source: Twitter, via bleepingcomputer.com

Recently purchased Github (now owned by Microsoft Corporation (NASDAQ: MSFT) apparently forgot (or neglected) to renew it’s content delivery network’s certificate, breaking what was once the developer’s best friend. Cruft always wins over competence – both operational or developmental – and so it goes…

The post MSFT X GITHUB: Cruft Thereof appeared first on Security Boulevard.

Read More

The post MSFT X GITHUB: Cruft Thereof appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/msft-x-github-cruft-thereof-8/?utm_source=rss&utm_medium=rss&utm_campaign=msft-x-github-cruft-thereof-8

5 Mistakes CISOs Make in Their Board Presentations

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain your strategic goals and plan, and answer questions; all with a largely non-technical audience. This can be quite challenging. Your presentation needs to …

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Security Boulevard.

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/5-mistakes-cisos-make-in-their-board-presentations-4/?utm_source=rss&utm_medium=rss&utm_campaign=5-mistakes-cisos-make-in-their-board-presentations-4

5 Mistakes CISOs Make in Their Board Presentations

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain your strategic goals and plan, and answer questions; all with a largely non-technical audience. This can be quite challenging. Your presentation needs to …

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Security Boulevard.

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/5-mistakes-cisos-make-in-their-board-presentations-3/?utm_source=rss&utm_medium=rss&utm_campaign=5-mistakes-cisos-make-in-their-board-presentations-3

5 Mistakes CISOs Make in Their Board Presentations

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain your strategic goals and plan, and answer questions; all with a largely non-technical audience. This can be quite challenging. Your presentation needs to …

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Security Boulevard.

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/5-mistakes-cisos-make-in-their-board-presentations-2/?utm_source=rss&utm_medium=rss&utm_campaign=5-mistakes-cisos-make-in-their-board-presentations-2

5 Mistakes CISOs Make in Their Board Presentations

5 Mistakes CISOs Make in Their Board Presentations

As a cybersecurity leader, you generally receive only a short time window in the board meeting for your update. During this time, you need to communicate key risks and remediation tactics, explain your strategic goals and plan, and answer questions; all with a largely non-technical audience. This can be quite challenging. Your presentation needs to …

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Security Boulevard.

Read More

The post 5 Mistakes CISOs Make in Their Board Presentations appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/5-mistakes-cisos-make-in-their-board-presentations/?utm_source=rss&utm_medium=rss&utm_campaign=5-mistakes-cisos-make-in-their-board-presentations

MSFT X GITHUB: Cruft Thereof

Microsoft Corporation’s Github is now laboring under the cruft that is Microsoft… Image Source: Twitter, via bleepingcomputer.com

Microsoft Corporation’s Github is now laboring under the cruft that is Microsoft… Image Source: Twitter, via bleepingcomputer.com

Recently purchased Github (now owned by Microsoft Corporation (NASDAQ: MSFT) apparently forgot (or neglected) to renew it’s content delivery network’s certificate, breaking what was once the developer’s best friend. Cruft always wins over competence – both operational or developmental – and so it goes…

The post MSFT X GITHUB: Cruft Thereof appeared first on Security Boulevard.

Read More

The post MSFT X GITHUB: Cruft Thereof appeared first on Malware Devil.



https://malwaredevil.com/2020/11/03/msft-x-github-cruft-thereof-7/?utm_source=rss&utm_medium=rss&utm_campaign=msft-x-github-cruft-thereof-7

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...