.

  • Written by Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

When faced with a ransomware[1] attack, a person or company or government agency finds its digital data encrypted by an unknown person, and then gets a demand for a ransom.

As that type of digital hijacking has become more common in recent years[2], there have been two major ways people have chosen to respond[3]: pay the ransom, which can be in the hundreds of thousands of dollars, or hire computer security consultants to recover the data independently.

Those approaches are missing another option that we have identified in our[4] cybersecurity policy studies[5]. Police have a long history of successful crisis and hostage negotiation[6] – experience that offers lessons that could be useful for people and organizations facing ransomware attacks.

Understanding the problem

In the first nine months of 2019, more than 600 U.S. government agencies – including entire municipal governments – suffered[7] ransomware attacks. Louisiana Governor John Bel Edwards was forced to declare[8] a state of emergency following ransomware attacks on state government servers that caused widespread network outages at many state agencies[9], including the Office of Motor Vehicles and the departments of Public Health and Public Safety.

Many of those victims chose to pay the ransom demanded by whoever hijacked their data. Lake City, Florida, for instance, paid US$460,000[10] to unlock its data.

Other targets, like the city of Baltimore, chose to fight back instead of paying the ransom. Rather than handing the attackers the $76,000 they demanded, Baltimore paid more than $10 million to purchase new equipment and absorbed more than $8 million in lost revenue[11] from taxes and fees that went unpaid while systems were down.

Those moves were in line with FBI advice[12] saying that paying the ransom could increase the likelihood of additional attacks, both on previous targets and new ones.

More recently, the FBI has softened its stance[13] to open the door to the paying of ransom in certain cases, but to always report doing so[14] to law enforcement. Although the agency still underscores that paying a ransom does not guarantee that the encrypted files will be recovered, or that the victim will not be targeted again, it does recognize that “all options[15]” should be considered in these cases.

Preventing ransomware

The best protection against ransomware is prevention[16].

Learn, and teach your coworkers and employees, how best to protect yourselves[17], both personally and professionally, from hackers. Keep software up-to-date with the latest security upgrades[18].

In addition, ensure your data is backed up regularly[19]. That way, if a ransomware attack happens, the victims can get professional help removing the malware from their systems, restore their data and move on.

Many companies have purchased insurance coverage[20] to help pay the costs of recovering from ransomware – but some of those policies also include paying ransoms[21] in the event of an attack.

Getting the data back isn’t a sure thing. Of the organizations that have paid the ransom, 20% haven’t actually recovered[22] their data.

That presents victims with the certainty of spending some amount of money – whether it’s a ransom payment or a bill for a cybersecurity specialist – and not necessarily getting their data back.

Deal with ransomware the way police deal with hostage situations Don’t rush to hand over the cash a ransomware attacker demands. Andrey Burmakin/Shutterstock.com[23]

An opportunity to engage

We have found another approach that could reduce the amount of money spent and simultaneously increase the certainty of data recovery.

Negotiating with hostage takers is tricky business, both online and offline. But many cybercriminals are often willing to bargain over the price of a ransomware payout. In fact, nearly three out of four ransomware hackers would return stolen data for a discounted price[24].

With cybercrime overall – of which ransomware is a large and growing component – slated to cost the global economy $6 trillion a year[25] by 2021, the opportunity to lower costs could be very valuable. For people or organizations without insurance coverage, there is little to lose by trying.

When a ransomware attack begins, affected computers’ screens normally announce the attack, include a demand for payment, and show a countdown clock, after which, allegedly, the hijacked data will become irretrievable.

That time is a window of opportunity to negotiate with the attackers. Usually, ransomware attackers require their victims to buy bitcoin[26], a form of digital currency[27], in order to pay the ransom. Most people don’t know how to buy bitcoin in the first place, so often an attacker has to teach the victim what to do. This opens a channel of communication between the victim and the attacker, which is analogous to the starting point police experts use to defuse hostage situations.

Negotiating with cybercriminals

In general, the less the victim knows about how to purchase bitcoin, the more time the victim has to build up rapport and trust with the cybercriminal. During a negotiation, an attacker may extend payment deadlines[28], lower the ransom, decrypt some data as a show of “good faith” or provide step-by-step assistance in purchasing bitcoin.

These steps may be understood as offers to gain the hostage’s trust and may reveal the hacker’s willingness to be flexible. A victim can request some data be restored, in part to prove that the hacker actually controls the files.

If the attacker doesn’t provide any decrypted data, it may be a sign that the ransomware is one that just erases data[29], rather than holding it hostage. That type of attack cannot be reversed, even if a ransom is paid.

If that’s the case, then it may be smart to terminate negotiation and not consider paying the ransom, either.

Deal with ransomware the way police deal with hostage situations In 2018, U.S. federal prosecutors charged a North Korean agent with computer crimes, including a ransomware attack. Mario Tama/Getty Images[30]

A risky business

No strategy for dealing with a ransomware attack is without risk.

Paying the ransom appears to increase the chances[31] of being targeted again in the future, according to one 2018 report. In a future attack, the attackers will be less likely to believe that you don’t know how to buy or send bitcoin.

Paying the ransom also lets the criminals, and at times rogue nations like North Korea[32] who also mount ransomware attacks, earn significant amounts with minimal risk, possibly increasing the likelihood of others being targeted as well.

Declaring that you won’t pay the ransom has its own dangers, as Baltimore saw, paying millions in fees to recover data and rebuild systems. That data could, at least potentially, have been reclaimed for just thousands of dollars.

In a similar situation, the city of Atlanta was hit by “GoldenEye[33]” ransomware, with cyberextortionists demanding $51,000 in bitcoin. Atlanta, like Baltimore, refused to pay. The city ended up spending more than $9.5 million[34] in taxpayer dollars for recovery.

These events make clear the moral and ethical dilemma around fueling crime and efficiently using public resources, a quandary that can be lessened, if not relieved entirely, by negotiating.

More organizations are trying this new approach, seeking to lower ransom payments and recover data less expensively. For example, the municipal government of Mekinac, Quebec, Canada, managed to lower its ransomware payment by 55%[35] through negotiations. In our view, it’s worth a try – and while certainly not risk-free, it could help.

[Deep knowledge, daily. Sign up for The Conversation’s newsletter[36].]

References

  1. ^ ransomware (www.us-cert.gov)
  2. ^ more common in recent years (iapp.org)
  3. ^ ways people have chosen to respond (www.wired.com)
  4. ^ our (kelley.iu.edu)
  5. ^ studies (scholar.google.com)
  6. ^ successful crisis and hostage negotiation (leb.fbi.gov)
  7. ^ suffered (statescoop.com)
  8. ^ declare (www.businessinsider.com)
  9. ^ many state agencies (arstechnica.com)
  10. ^ paid US$460,000 (www.hipaajournal.com)
  11. ^ lost revenue (www.baltimoresun.com)
  12. ^ FBI advice (www.welivesecurity.com)
  13. ^ softened its stance (www.ic3.gov)
  14. ^ report doing so (www.theregister.co.uk)
  15. ^ all options (www.ic3.gov)
  16. ^ prevention (edscoop.com)
  17. ^ how best to protect yourselves (theconversation.com)
  18. ^ latest security upgrades (theconversation.com)
  19. ^ data is backed up regularly (www.csoonline.com)
  20. ^ insurance coverage (theconversation.com)
  21. ^ include paying ransoms (www.hipaajournal.com)
  22. ^ 20% haven’t actually recovered (features.propublica.org)
  23. ^ Andrey Burmakin/Shutterstock.com (www.shutterstock.com)
  24. ^ return stolen data for a discounted price (dx.doi.org)
  25. ^ $6 trillion a year (www.justice.gov)
  26. ^ bitcoin (www.nerdwallet.com)
  27. ^ digital currency (theconversation.com)
  28. ^ extend payment deadlines (www.elliptic.co)
  29. ^ just erases data (arstechnica.com)
  30. ^ Mario Tama/Getty Images (www.gettyimages.com)
  31. ^ appears to increase the chances (www.scmagazine.com)
  32. ^ North Korea (www.npr.org)
  33. ^ GoldenEye (www.cnet.com)
  34. ^ more than $9.5 million (www.reuters.com)
  35. ^ lower its ransomware payment by 55% (www.insurancebusinessmag.com)
  36. ^ Sign up for The Conversation’s newsletter (theconversation.com)

Authors: Scott Shackelford, Associate Professor of Business Law and Ethics; Director, Ostrom Workshop Program on Cybersecurity and Internet Governance; Cybersecurity Program Chair, IU-Bloomington, Indiana University

Read more https://theconversation.com/deal-with-ransomware-the-way-police-deal-with-hostage-situations-129213

Metropolitan republishes selected articles from The Conversation USA with permission

Visit The Conversation to see more