The
United States Department of Homeland Security (DHS), in collaboration with
Canadian Cyber Incident Response Centre (CCIRC), released this Alert on March
31, 2016, to provide further information on ransomware, specifically its main
characteristics, its prevalence, variants that may be proliferating, and how
users can prevent and mitigate against ransomware.
DHS
defines ransomware as “a type of malware that infects computer systems,
restricting users’ access to the infected systems. Ransomware variants have
been observed for several years and often attempt to extort money from victims
by displaying an on-screen alert. Typically, these alerts state that the user’s
systems have been locked or that the user’s files have been encrypted. Users
are told that unless a ransom is paid, access will not be restored. The ransom
demanded from individuals varies greatly but is frequently $200–$400 dollars
and must be paid in virtual currency, such as Bitcoin.”
The
Alert comes in response to an increasing number of ransomware attacks on the
systems of healthcare organizations. In the past month, five organizations have
reported being hit by computer viruses.
Targets
so far include various Prime Healthcare Services hospitals, Hollywood
Presbyterian Medical Center, King's Daughters' Health Hospital, and the MedStar
Health system.
A
spike in ransomware use by hackers goes back to 2012, when such attacks
estimated profits of $33,000 a day for the hackers.
That
has led to a proliferation of ransomware variants, said the statement from the
United States-Computer Emergency Readiness Team and the Canadian Cyber Incident
Response Center.
Some
variants of ransomware encrypt not just the files on the infected device but
also the contents of shared or networked drives, according to US-CERT/CCIRC.
These variants render the users' files useless until criminals receive a
ransom.
One
variant, called Locky, has infected computers belonging to healthcare
facilities and hospitals in the U.S., Germany and New Zealand, the
cybersecurity organizations warned.
It
propagates through spam e-mails that include malicious Microsoft Office
documents or compressed attachments (e.g., .rar, .zip).
US-CERT
recommends that users and administrators take some of the following preventive
measures to protect their computer networks from ransomware infection.
·
Employ
a data backup and recovery plan for all critical information. Perform and test
regular backups to limit the impact of data or system loss and to expedite the
recovery process. Ideally, this data should be kept on a separate device, and
backups should be stored offline.
·
Use
application whitelisting to help prevent malicious software and unapproved
programs from running. Application whitelisting is one of the best security
strategies as it allows only specified programs to run, while blocking all
others, including malicious software.
·
Keep
your operating system and software up-to-date with the latest patches.
Vulnerable applications and operating systems are the target of most attacks.
Ensuring these are patched with the latest updates greatly reduces the number
of exploitable entry points available to an attacker.
·
Maintain
up-to-date anti-virus software, and scan all software downloaded from the
internet prior to executing.
For
more tips and suggestions, visit the official Alert (TA16-091A)
here.
The original article by
Joseph Conn can be found at the following address: http://www.modernhealthcare.com/article/20160404/NEWS/160409962?utm_source=modernhealthcare&utm_campaign=hits&utm_medium=email&utm_content=20160404-NEWS-160409962
No comments:
Post a Comment