The increase in ransomware attacks during the COVID-19 pandemic may lead to a new internet

The recent ransomware attacks on Colonial Pipeline and JBS USA Holdings Inc — the world’s largest meat processors — underscore the growing brazen nature of organised, deliberate attacks on increasingly significant targets, and our chronic inability to defend against them.

PTI
June 16, 2021 / 12:34 PM IST

Representative image

Make no mistake: We are also in the midst of a digital pandemic of ransomware attacks.

The recent ransomware attacks on Colonial Pipeline and JBS USA Holdings Inc — the world’s largest meat processors — underscore the growing brazen nature of organised, deliberate attacks on increasingly significant targets, and our chronic inability to defend against them.

What we need is a new internet. The old one is broken.

Origins of the internet

Today’s internet originated from the Advanced Research Projects Agency Network (ARPANET) in the late 1960s — a conglomerate of research institutions connecting military, political and industrial actors during the Cold War in the United States.

COVID-19 Vaccine

Frequently Asked Questions

View more
How does a vaccine work?

A vaccine works by mimicking a natural infection. A vaccine not only induces immune response to protect people from any future COVID-19 infection, but also helps quickly build herd immunity to put an end to the pandemic. Herd immunity occurs when a sufficient percentage of a population becomes immune to a disease, making the spread of disease from person to person unlikely. The good news is that SARS-CoV-2 virus has been fairly stable, which increases the viability of a vaccine.

How many types of vaccines are there?

There are broadly four types of vaccine — one, a vaccine based on the whole virus (this could be either inactivated, or an attenuated [weakened] virus vaccine); two, a non-replicating viral vector vaccine that uses a benign virus as vector that carries the antigen of SARS-CoV; three, nucleic-acid vaccines that have genetic material like DNA and RNA of antigens like spike protein given to a person, helping human cells decode genetic material and produce the vaccine; and four, protein subunit vaccine wherein the recombinant proteins of SARS-COV-2 along with an adjuvant (booster) is given as a vaccine.

What does it take to develop a vaccine of this kind?

Vaccine development is a long, complex process. Unlike drugs that are given to people with a diseased, vaccines are given to healthy people and also vulnerable sections such as children, pregnant women and the elderly. So rigorous tests are compulsory. History says that the fastest time it took to develop a vaccine is five years, but it usually takes double or sometimes triple that time.

View more
Show

It allowed for secure communications in case of conflict, and to facilitate research and development through electronic sharing of information. It was a closed, tightly controlled, highly secure, invitation-only network.

The invention of the World Wide Web (WWW) by Tim Berners-Lee in 1990 led to the browser-based internet that we know today.

The WWW introduced, and advocated for, an open, inclusive, universal and unconstrained mode for networks to communicate with each other. It introduced the notion of hyperlinks that a user could simply click on and be transported to a new web page on a separate network. This was the start of the unregulated, user-driven, content-rich internet.

The paradox of the internet is that it was born, has grown and exists in an environment where control and access have been in constant tension and conflict.

The rise of ransomware

Cybercrime is a growing, highly successful and profitable industry. It is estimated by industry that cybercrime costs will grow by 15 percent per year to reach USD 10.5 trillion by 2025: the third greatest “economy” in the world, after those of the US States and China.

A big part of this is ransomware, multi-pronged attacks capturing an organization’s data and systems. Since the start of the pandemic, ransomware attacks have increased by nearly 500 percent since the start of the COVID-19 pandemic.

The average ransom payment has also continued to climb, up 43 percent from the last quarter of 2020 to an average of over USD 200,000. What is especially insidious about these attacks is that a ransom demand is often accompanied by a breach and extraction of company data, and a concurrent extortion threatening to release this data unless additional payments are made.

In the first quarter of 2021, over three-quarters of ransomware attacks were tied to such a threat.

Criminals have also evolved to become increasingly systemic. The recent attack on Colonial Pipelines by the hacker collective DarkSide exemplifies this. Like their state-sponsored counterparts, criminal collectives have created virtual organisations and enacted focus strategies targeting specific sectors and companies.

They have infinite resources, skills and patience. They are playing a long game where targets are identified, carefully reconnoitred and only acted upon when the maximum value can be extracted.

CNA Financial was attacked in late March, and paid a ransom of USD 40 million — one of the biggest payments on record.

The hackers were apparently interested in obtaining access to CNA’s client database not only to blackmail the company itself, but to identify clients that had purchased cyberinsurance with a ransomware payment rider to identify the most lucrative targets.

DarkSide are also selling ransomware packs to other hackers — Ransomware-as-a-Service (RaaS) is becoming a growing profit centre.

The new old internet

Legislators have, predictably, responded to these attacks. US President Joe Biden has directed federal agencies to bring all of their resources to bear on dealing with digital disruptions. The Department of Homeland Security is developing a set of mandatory rules for how pipelines, and likely other infrastructure providers, will need to safeguard their assets.

While a good first step, it will not be enough, and we will continue to react, to be behind the attack curve.

Intranets — closed, proprietary networks — might hold the key to solving this threat.

We foresee a new internet emerging, with two distinct sides. On one side, we’ll have the wholly unfiltered, minimally regulated, Wild West internet that anyone can access.

On the other side, we might see the evolution of what could be called the “World Wide Intranet,” that is, widely accessible but tightly controlled websites with stringent access controls to prevent criminal activity, much like the closed corporate intranets that gained popularity two decades ago.

Responsive security

Large online merchants like Amazon, the government, health-care providers or other large organiSations will no longer tolerate criminal assaults on their and their stakeholders’ data and resources. As such, as security measures like multi-factor authentification evolve, they will increasingly be adopted by these organizations and passed onto consumers as a condition of access.

As a society, we accept controls when the cost of not having them becomes greater than the restrictions they impose. We see this trend as an inevitable consequence of the growing security threats affecting not only networks but the individuals that transact with them.

By 2025, the world will store 200 Zettabytes (one trillion gigabytes) of data. The accompanying growth in transactions leaves us no other choice but to tighten identity and access controls.

One pathway might divide the web into one open, but inherently risky, internet and one closed, controlled, regulated and inherently untrusting one where security and privacy dominate. (The Conversation)
PTI
TAGS: #coronavirus #ransomware attacks #Technology
first published: Jun 16, 2021 12:34 pm