{{item.title}}
{{item.text}}
{{item.title}}
{{item.text}}
Johannes Dohren
Partner, Cybersecurity and Privacy, PwC Switzerland
Even if individual steps differ in detail, the course of a ransomware follows a similar logic. It can be illustrated by being divided into four phases – preparation, attack, spread and infection. In our blog series, we show these phases based on an example scenario from the perspective of a ransomware operator, and show which security measures are truly effective. Finally, we touch on the legal aspects of ransomware payments.
Ransomware attacks continued to be the biggest threat to corporate cybersecurity in 2021 – across all regions and industries. The number of reported ransomware attacks, in which criminals attempt to extort companies, increased from 1,300 in 2020 to 2,435 in 2021.
At PwC, we help clients evaluate their ability to deal with the main cyber risks and threats of the digital world in an easy and understandable way.
In this phase, the hacker collects all the data which may be relevant. This includes documents, database extracts as well as access and contact details. Customer details are also of interest here. They can be used or resold for future attack campaigns, and thus enable the next phase in the criminal ransomware value chain. Data exfiltration usually takes several days. File systems and databases are searched automatically and the results downloaded directly, although access often needs to be re-established manually. Our attacker cannot accomplish all this him/herself, and so depends on other cybercriminals who specialise in this phase.
Once the data has been exfiltrated, the hacker activates the actual malware and encrypts the data. The encryption directly puts the attacked organisation under pressure, and at the same time is proof that the attack has been carried out successfully. With this, the work in Phase 4 is done. The hacker may pass relevant information onto another cybercriminal who takes over the communication with the “new client”, and after a good start to the week the hacker may move onto the next organisation on his/her list of targets.
We have a broad range of flexible solutions, including entire packages, to help you plan and prepare for cybersecurity incidents.
If the cybercriminals have gotten this far, you can no longer prevent the attack. However, you can still contain it, as well as limit the damage and in particular the amount of work which needs to be done afterwards. This is not just sensible from an economic point of view; it is also urgently necessary to react quickly to restore trust in the company’s IT systems.
#social#
At PwC, we are a community of solvers – powered by technology – committed to helping you protect everyone, and everything, you care about.