preparing for a ransomware attack
play

Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, - PowerPoint PPT Presentation

Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington & Sutcliffe Darren Teshima, Orrick, Herrington & Sutcliffe What is ransomware? Malicious software


  1. Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington & Sutcliffe Darren Teshima, Orrick, Herrington & Sutcliffe

  2. What is ransomware? • Malicious software • Denies users access to systems or data • Systems/data held hostage until ransom is paid • Failure to meet demands could result in data deletion Orrick | 2 June 17

  3. Ransomware evolution Orrick | 3 June 17

  4. Ransomware attack cycle Orrick | 4 June 17

  5. Trends • $1 billion industry in 2016 and growing • Bitcoin value up 3x • Cryptoware Blockers Orrick | 5 June 17

  6. Reputational Impact is Costly of consumers worry about the security of their personal information. 74.8% Temkin Group "Consumer Benchmark Survey" of consumers don’t believe organizations care about their private data 72.5% and keeping it safe and secure. HyTrust Inc., the Cloud Security Automation Company of consumers believe failure to keep customer information secure has a significant negative impact on trust in a company. 80% Edelman Trust Barometer: Financial Services Industry Actions your customers take when you falter 56% 40% 29% Political Action (sign a petition, Stop/Reduce Technology Use Social Activity (post to social contact a politician media, write an op-ed or letter) Orrick | Source: Edelman Proprietary Study, 2014 6 June 17

  7. To pay or not to pay… “The FBI does not support paying a ransom to the adversary . Paying a ransom does not guarantee the victim will regain access to their data; in fact, some individuals or organizations are never provided with decryption keys after paying a ransom . Paying a ransom emboldens the adversary to target other victims for profit, and could provide incentive for other criminals to engage in similar illicit activities for financial gain. While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers.” Orrick | 7 June 17

  8. Is it a breach? Where PHI is “encrypted as the result of a ransomware attack, a breach has occurred because the PHI encrypted by the ransomware was acquired … and thus is a ‘disclosure’ not permitted under the HIPAA Privacy Rule.” Notification may not be required if the entity can demonstrate a “low probability that the PHI has been compromised,” • lack of attempted or actual data ex-filtration, • mitigation based on disaster recovery and data backups • use of appropriate level of encryption Must be highly diligent in their forensic analysis and risk assessment to take advantage of the notification exception: • Thorough investigation • Completed in good faith • Conclusions reasonable given circumstances • Documentation Also consider state notification rules based on “access” to personal information, such as Connecticut, Florida, Kansas, Louisiana, and New Jersey Orrick | 8 June 17

  9. Violation of FTC Act? “A company’s unreasonable failure to patch vulnerabilities known to be exploited by ransomware might violate the FTC Act.” -- (Then) Chairwoman Edith Ramirez (2016) Failure to address “pervasive security bugs” that leave systems vulnerable to malware will be a key factor in the FTC’s decision to open an investigation or pursue an enforcement action. Orrick | 9 June 17

  10. What to do? Prevention Efforts • Increase employee awareness of ransomware and role in protecting the organization’s data • Patch operating system, software, and firmware on digital devices • Automatic updates to antivirus and anti-malware solutions and conduct regular scans • Manage use of privileged accounts—assign administrative access only where absolutely needed and necessary • Configure access controls—users don’t need write-access to all information; read only ok • Disable macro scripts from office files transmitted over e-mail • Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations Business Continuity Efforts • Back up data regularly and verify the integrity of those backups regularly • Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up Orrick | 10 June 17

  11. In-House Counsel – What Should You Consider? 1. Prepare – End user education • Consider performing periodic unannounced mock phishing exercises where the users receive emails or attachments that simulate malicious behavior • End users should know who to contact and how to report possible ransomware attacks – Have a clearly defined, up-to-date incident response plan – Back up data regularly 2. Patch – Good security hygiene – Create internal corporate policies that require end users to update patches quickly Orrick | 11 June 17

  12. In-House Counsel – What Should You Consider? 3. Monitor – Maintain current antivirus and/or end point protection – Only grant permissions necessary that an end user requires to perform daily jobs 4. Respond – Detect – Analysis • Malware identification • Root cause analysis – Containment – Recovery • Restore from back up – Post-Incident Activity • What are the lessons learned? Orrick | 12 June 17

  13. Additional Considerations • Refresh incident response plan to address ransomware scenarios • Incorporate business continuity and disaster recovery plans into IRP • Conduct ransomware tabletop exercises • Engage forensic experts early; consider providers with ransomware payment programs • Conduct regular risk and vulnerability assessments • Consider endpoint monitoring technologies • Insurance Orrick | 13 June 17

  14. Insurance Considerations • Cyber Extortion Coverage for Ransomware – Provides coverage for ransom payment – Subject to certain conditions, including: • Insurer’s prior consent • Notification to law enforcement • Subject to a sublimit – Definition of “currency” • Ensure it includes cryptocurrencies, like Bitcoin Orrick | 14 June 17

  15. Insurance Considerations (cont.) • Additional Cyber Coverages May Be Implicated – First-party coverages in event ransomware disrupts business or destroys data, as opposed to simply locking down system – If ransomware is part of larger breach, and PII is compromised, breach notification and third-party liability coverage may be implicated • Notice to Insurer of ransomware : Data breach may be considered “related,” subject to a single retention. Without notice of initial ransomware, there is a risk the data breach costs may be excluded • Check Non-Cyber Policies for Coverage : e.g., crime policies Orrick | 15 June 17

  16. Thank You Aravind Swaminathan Partner Orrick, Herrington & Sutcliffe LLP T 206 639 9157 E aravind@Orrick.com Monica Patel Darren Teshima Senior Regional Counsel IBM Partner Orrick, Herrington & Sutcliffe LLP T 415 545 3246 T 415 773 4286 E patelmo@us.ibm.com E dteshima@orrick.com June 17 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend