www.washingtonpost.com Open in urlscan Pro
2.19.32.96  Public Scan

URL: https://www.washingtonpost.com/politics/2023/03/30/think-ransomware-gangs-wont-thrive-this-year-think-again-experts-say/
Submission: On April 13 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Accessibility statementSkip to main content

Democracy Dies in Darkness

Subscribe

Sign in


Advertisement


Close
The Washington PostDemocracy Dies in Darkness
The Cybersecurity 202

A newsletter briefing on cybersecurity news and policy.

Subscribe to the newsletterAdd



THINK RANSOMWARE GANGS WON'T THRIVE THIS YEAR? THINK AGAIN, EXPERTS SAY

Analysis by Tim Starks

with research by David DiMolfetta

March 30, 2023 at 6:52 a.m. EDT

A newsletter briefing on cybersecurity news and policy.

Add
Sign upfor The Cybersecurity 202 newsletter
Comment on this storyComment5

Gift Article

Share

Welcome to The Cybersecurity 202! And greetings from (just outside of) San
Francisco, one of my favorite few cities. As I type this, I have a splendid view
of the Golden Gate Bridge. 

Reading this online? Sign up for The Cybersecurity 202 to get scoops and sharp
analysis in your inbox each morning.



WpGet the full experience.Choose your planArrowRight


Below: The U.S. sends cybersecurity aid to Costa Rica, and a possible North
Korean-linked cyberattack could have thousands of victims. First:

BIG MAJORITY OF THE NETWORK EXPECTS RANSOMWARE TO BE MORE DANGEROUS IN 2023 THAN
IN 2022


Two-thirds of experts said that they believed the threat posed by ransomware
will increase this year. (Chris Ratcliffe/Bloomberg)

There were signs that ransomware gangs might — key word, “might” — have been on
the run in 2022.

But experts from The Cybersecurity 202 Network are far from confident that the
trend, if real, will continue in 2023. A big majority of the expert group, 67
percent, expected ransomware to take off again in this calendar year.

Another 23 percent anticipated that the threat ransomware poses will stay the
same, compared to last year. And only 10 percent thought the threat would
decrease.


DECREASE

U.S. government officials believe they’ve made a dent in these cybercrime gangs.

Advertisement

Story continues below advertisement



“I am heartened by the success we've seen on ransomware,” Deputy Attorney
General Lisa Monaco said Wednesday at the Aspen Verify conference in San
Francisco. “What I think we've shown is that we are determined to use every tool
that we can to get after this problem.”

Bruce Schneier, a lecturer and fellow at Harvard University and chief of
security architecture at Inrupt, backed up Monaco’s take.

“Law enforcement's ability to track, and in some cases recover, payments is
making this a less profitable crime,” he answered. “Also, we are finally
engaging the international community in disrupting the infrastructure used by
ransomware gangs.”

Schneier said the turmoil affecting the value of cryptocurrency has hampered
ransomware gangs because that’s how they demand payment from victims. It’s an
idea seconded by John Pescatore, director of emerging security trends at the
SANS Institute, who added that many companies have shored up their defenses
against these kinds of attacks.

Advertisement

Story continues below advertisement



The improved defenses were a factor that Shane Huntley, the director of Google’s
Threat Analysis Group, also cited. “Ransomware will continue to be a significant
risk but one that is more manageable,” he said, adding that the war in Ukraine
has diluted the focus of Russian ransomware operators.

INCREASE

Yet some of those same factors — the strength of cyberdefenses and what’s
happening with cryptocurrencies — were cited by the experts who expected the
ransomware threat to rise in 2023.

“True, we’ve had success in recapturing ransom payments, disrupting the
ransomware gangs, and improving cyberdefenses, but the fact remains that it’s an
awfully easy crime to commit,” said Glenn Gerstell, a senior adviser at the
Center for Strategic and International Studies who is a former general counsel
of the National Security Agency. “Even though many big networks are better
fortified and backed up, ransomware criminals will have no trouble finding
lucrative targets at minimal cost and risk.”

Advertisement

Story continues below advertisement



And that crypto turmoil?

“Cybercriminals have learned where the money is, and no amount of government
sanctions or cryptocurrency market volatility can change that in the near term,”
said Jay Kaplan, chief executive and co-founder of Synack. “Ransomware criminals
keep moving to softer targets as they try to squeeze money out of schools and
hospitals. Attackers haven’t run out of targets yet as the same exploitable
vulnerabilities keep cropping up in their victims’ networks.”

Several Network members expect artificial intelligence to improve ransomware
gangs’ fortunes.

 * “ChatGPT can already write great emails and pass many standardized tests,”
   said Betsy Cooper, the founding director of the Aspen Tech Policy Hub and a
   senior adviser at Albright Stonebridge Group. “I expect hackers to find ways
   in 2023 to exploit this technology to tailor targeted phishing scams so they
   are even harder for humans to spot.”
 * “The use of these simple to use, but powerful AI engines will improve at
   least exponentially the ability of criminals/nation-state actors to craft
   lures that are more accurate, on target, victim specific, and error free,”
   said Rodney Joffe, a cybersecurity consultant.
 * “The growth of Ransomware-as-a-Service (renting software, sometimes on a
   franchise business model) had already reduced the barriers to entering the
   ransomware field, since skill in writing code was no longer needed to launch
   a malware campaign,” answered Jim Richberg, field chief information security
   officer at the cybersecurity firm Fortinet. “The growing popularity of OpenAI
   engines is likely to accelerate this trend.”

And a couple experts said they thought the numbers aren’t telling the whole
picture.

Story continues below advertisement


 * “The threat will increase, whether it will be observed through official
   reporting and other analytic tools may not,” wrote Megan Stifel, chief
   strategy officer for the Institute for Security and Technology. “Despite
   reports of payments declining, we know there are gaps in actual ransomware
   incidents vs. the number reported to law enforcement.”
 * “While the sheer number of attacks may be down, the threat continues to
   grow,” said Allan Liska, senior security architect at the cybersecurity firm
   Recorded Future. “Overall, the intensity of attacks has increased, with
   ransomware groups now disrupting entire countries with their attacks and
   using increasingly repulsive extortion tactics against their victims. In
   addition, we now see ransomware being used by nation-state actors such as
   China, Russia and Iran.”

STAY THE SAME

The murkiness of the numbers was a frequent factor among those who answered that
they thought the threat of ransomware would stay the same in 2023.

Advertisement


“Overall ransomware attack numbers are somewhat hard to quantify due to lack of
visibility and reporting, but what we have seen recently is more targeted and
thoughtful attacks,” said Lesley Carhart, a principal incident responder at the
industrial cybersecurity company Dragos. “It is not unreasonable to expect less
overall haphazard and ineffective attacks, and more concentration on critical
industry and less defended targets.”

The balance of good work to counter ransomware and persistent vulnerability led
Chris Wysopal, chief technology officer at Veracode, to argue the threat would
stay the same.

Story continues below advertisement



“There have been some concerted efforts to diminish the impact of ransomware
against critical infrastructure and disrupt the ecosystem, but there are no
fundamental changes in the underlying vulnerable technology and protections most
organization use,” he said. “We still have a stockpile of kindling spread
throughout small and medium organizations, which should keep the ransomware
operators well fueled.”

Advertisement


Correction: A previous version of this newsletter included an incorrect title
for Lesley Carhart. This version has been updated.

THE NETWORK

A few more answers:

 * Increase: “C-suite distractions of the latest financial headlines coupled
   with shrinking security team staff and budget resources creates a perfect
   storm for increased ransomware attack impact,” wrote Elizabeth Wharton, vice
   president for operations at Scythe.
 * Increase: “It's a growth industry,” said Tor Ekeland, managing partner for
   Tor Ekeland Law. “Bad infosec will never die.”
 * Decrease: “It appears that the rapid rise of ransomware has lost some steam,
   but this problem isn’t going away,” said John Hultquist, vice president at
   Mandiant Threat Intelligence. “Russian and North Korean actors are still at
   it, safely carrying out attacks from their sanctuary states. Attacks on
   critical infrastructure are once again on the rise from actors with little to
   fear.”
 * Stay the same: “Just as covid isn’t going away or even abating worldwide,
   most organizations have accepted they will eventually fall victim to
   ransomware at some point, and they are not taking sufficient preventative
   measures because they likely believe they will emerge healthy enough after a
   ’mild’ ransomware infection,” said Katie Moussouris, founder and CEO of Luta
   Security.

THE KEYS

U.S. COMMITTING $25 MILLION TO COSTA RICA AMID HISTORY OF RANSOMWARE ATTACKS



The U.S. State Department is sending $25 million to Costa Rica to strengthen the
nation’s cybersecurity posture amid a swarm of ransomware attacks that have
plagued the country over the past year, according to a senior administration
official.

Story continues below advertisement



The official, who spoke on background to provide the information to reporters,
said the funding was provided “in response to a direct request from President
Chaves to President Biden.” 

The money will help Costa Rica’s Ministry of Science, Innovation, Technology and
Telecommunications build a security operations center for detecting, responding
to and preventing cyberattacks. Funds will also be dedicated to technical
support and training, as well as hardware and software provisions. 

Advertisement

 * The official added that the Central American nation applied to join the
   U.S.-led Counter Ransomware Initiative, a group of 37 governments dedicated
   to fighting worldwide ransomware threats.

Costa Rica declared a national emergency following an attack from the
Russian-linked Conti ransomware group that crippled the nation’s tax and pension
systems, as we reported last year.

POSSIBLE NORTH KOREAN-LINKED SUPPLY CHAIN CYBERATTACK COULD HAVE THOUSANDS OF
VICTIMS



A large-scale supply chain attack that modified enterprise installation software
is said to have stolen credentials from companies worldwide, AJ Vicens reports
for CyberScoop, citing findings from SentinelOne.

Story continues below advertisement



“This sort of large-scale attack that takes advantage of a company’s supply
chain — similar to how attackers leveraged a flaw within a SolarWinds product
update to install back doors inside its customers’ networks — can be difficult
to defend against and could lead to devastating consequences for victims,”
Vicens writes, adding that such attacks are typically linked to nation-state
hackers.

Advertisement


SentinelOne traced the malicious installation software to 3CX, an online
conferencing tool provider.

The attack has not been traced directly to a group, though the story says there
is budding evidence it may have originated from Lazarus Group, an entity that
the U.S. government has linked to hacking operations in North Korea.

RUSSIAN-LINKED GROUP EXPLOITING VULNERABILITY TO STEAL U.S., EUROPEAN EMAIL DATA



A Russian-linked hacking group has been targeting American and European
government officials’ email accounts, according to new findings from Proofpoint.

Story continues below advertisement



The entity, known as TA473 or Winter Vivern, appears to side with Russian and
Belarusian geopolitical views in Moscow’s war on Ukraine, the report says. Since
early February, it has been leveraging a vulnerability in email software
platform Zimbra that allowed the group to access inboxes of government
officials.

Advertisement


“This actor has been tenacious in its targeting of American and European
officials as well as military and diplomatic personnel in Europe,” said Michael
Raggi, a threat researcher at Proofpoint, adding that the group has “invested an
ample amount of time” studying the mail portals of officials closely involved in
political affairs and the war in Ukraine.

GOVERNMENT SCAN

FCC proposes rules to reassess foreign-owned US telecom services authority
(Reuters)

White House takes spyware efforts to the international stage (Nextgov)

SECURING THE BALLOT

Online voting provider paid for academic research in attempt to sway U.S.
lawmakers  (CyberScoop)

INDUSTRY REPORT

How TikTok built a ‘team of Avengers’ to fight for its life (Politico)

Arrests spotlight online threats, harassment in hacker community (Bloomberg
News)

GLOBAL CYBERSPACE

Hackers used spyware made in Spain to target users in the UAE, Google says
(TechCrunch)

CYBER INSECURITY

Exxon’s climate opponents were infiltrated by massive hacking-for-hire operation
(The Wall Street Journal)

Lumen Technologies says ransomware attack disrupted call centers (Cybersecurity
Dive)

Microsoft patched Bing vulnerability that allowed snooping on email and other
data (The Wall Street Journal)

ENCRYPTION WARS

Free AI programs prone to security risks, researchers say (Bloomberg News)

PRIVACY PATCH

The DEA bought customer data from rogue employees instead of getting a warrant
(Motherboard)

DAYBOOK

 * Rep. Jim Himes (D-Conn.), the top Democrat on the House Permanent Select
   Committee on Intelligence, has a fireside chat at the State Department’s
   Summit for Democracy, with sessions kicking off at 12:30 p.m.

SECURE LOG OFF



Thanks for reading. See you tomorrow.

5 Comments
GiftOutline
Gift Article




Subscribe to comment and get the full experience. Choose your plan →


View more

Loading...
Advertisement


Advertisement

TOP STORIES
Travel
Local guides, travel tips and the latest industry news
‘Hateful’ laws may make Florida unsafe for travel, LGBTQ advocates say


Bunk beds are coming to a plane near you


Advice|8 hilarious but true wildlife tips from the National Park Service


Refresh
Try a different topic

Sign in or create a free account to save your preferences
Advertisement


Advertisement

Company
 * About The Post
 * Newsroom Policies & Standards
 * Diversity and Inclusion
 * Careers
 * Media & Community Relations
 * WP Creative Group
 * Accessibility Statement

Get The Post
 * 
 * Become a Subscriber
 * Gift Subscriptions
 * Mobile & Apps
 * Newsletters & Alerts
 * Washington Post Live
 * Reprints & Permissions
 * Post Store
 * Books & E-Books
 * Newspaper in Education
 * Print Archives (Subscribers Only)
 * Today’s Paper
 * Public Notices

Contact Us
 * Contact the Newsroom
 * Contact Customer Care
 * Contact the Opinions team
 * Advertise
 * Licensing & Syndication
 * Request a Correction
 * Send a News Tip
 * Report a Vulnerability

Terms of Use
 * Digital Products Terms of Sale
 * Print Products Terms of Sale
 * Terms of Service
 * Privacy Policy
 * Cookie Settings
 * Submissions & Discussion Policy
 * RSS Terms of Service
 * Ad Choices

washingtonpost.com © 1996-2023 The Washington Post
 * washingtonpost.com
 * © 1996-2023 The Washington Post
 * About The Post
 * Contact the Newsroom
 * Contact Customer Care
 * Request a Correction
 * Send a News Tip
 * Report a Vulnerability
 * Download the Washington Post App
 * Policies & Standards
 * Terms of Service
 * Privacy Policy
 * Cookie Settings
 * Print Products Terms of Sale
 * Digital Products Terms of Sale
 * Submissions & Discussion Policy
 * RSS Terms of Service
 * Ad Choices









THE WASHINGTON POST CARES ABOUT YOUR PRIVACY

We and our partners store and/or access information on a device, such as unique
IDs in cookies to process personal data. You may accept or manage your choices
by clicking below, including your right to object where legitimate interest is
used, or at any time in the privacy policy page. These choices will be signaled
to our partners and will not affect browsing data.


WE AND OUR PARTNERS PROCESS DATA TO PROVIDE:

Actively scan device characteristics for identification. Select basic ads. Store
and/or access information on a device. Create a personalised ads profile. Select
personalised ads. Create a personalised content profile. Select personalised
content. Measure ad performance. Measure content performance. Apply market
research to generate audience insights. Develop and improve products. View list
of partners

I accept Disable all Manage cookies