Ransomware – The Fight-back has begun!

Security researchers and experts back at the end of 2015 and earlier this year predicted 2016 to be the “Year of Ransomware” due to the dramatic increase in ransomware attacks, infections and reports.  The malware variants used for extortion and blackmail became more and more prevalent as the year progressed and it was clear that the new form of attack was a firm favourite of hackers and cyber criminals across the globe.

Up until now the only defence has been prevention and resorting to backups, with authorities pushing out advice and guidance to communities and businesses to try to tighten up security practices, improve their “cyber hygiene” and try to look at preventing the infection, with the only fall-back being to resort to good, clean backups of the data.  Whereas many did pay the ransoms, this was never advised as it merely encourages criminals to continue to utilise the tactic, and there is never any guarantee that victims would get their data back.

Thankfully, new developments have started to emerge to help in fight against ransomware, with new tools and advice having recently been published.

It was recently announced in the Hacker News that the American firm Cybereason have released a free ransomware monitoring and detection tool dubbed RansomFree which they claim is able to detect ransomware trying to run on your system and can halt any active processes running as a result, requiring user authentication before taking further action.  This appears to be the beginning of a new form of security software for end-point devices to help protect against this malicious attack type.

This new tool follows the announcement of a similar tool for MacOS devices called RansomWhere, which does a similar thing for Apple devices.

These tools are all well-and-good, but as always, prevention is better than cure, and so one of the best first lines of defence is still good security on your devices and awareness of potential social engineering techniques used to infect your systems with ransomware.  For the latest advice visit either the Government’s CyberAware website, the National Cyber Security Centre (NCSC) or the not-for-profit organisation Get Safe Online.

Security Vs Forensics: Dawn of a Massive Headache?!

Is the increase in cyber security across all sectors, with the implementation of better encryption and safeguard solutions going to impact negatively on subsequent digital forensic and incident response investigations?  If so, then is the trade-off a worth it?

This is a conundrum that has concerned me (and I’m sure many others) for a while, and having worked within both the Cyber Security world and the Forensics world, I have seen and discussed both sides of the argument whilst sitting within each camp.  I would love to hear what other people think though and whether or not people share my concerns.

So let us quickly look at the background (bear in mind I am going to be very general and nonspecific here):

The Cyber Crime Threat

Cyber crime, data breaches, data theft and digital espionage is an ever-growing threat and a hugely under-reported problem.  Most attacks for businesses are never reported either due to the sheer volume of attacks taking place or the reputational concerns of the organisation, and so the true nature of the threat never gets officially documented.  Threat intelligence is sometimes shared and analysed between collaborated consortiums and working groups, which gives an idea of the level of under reporting taking place, and dataflow and traffic analysis provides a more holistic overview of the type of threats and intended targets or potentially infected or compromised servers.  The numbers are quite frankly terrifying, but the fact that this is now being brought to the forefront of discussion and formally identified as a National Tier 1 threat is excellent news for all of us.

A Shift in Focus

A huge amount of work is now being undertaken by cyber security experts working with law enforcement agencies, Police Forces, Academic institutions and industry partnerships to try to put a plan together on tackling this massive threat.  The focus now is on crime prevention rather than necessarily crime detection.  A really good paper from Cardiff University in partnership with the City of London Police gives a really good grounding as to why this shift of focus is so crucial (http://www.cardiff.ac.uk/news/view/145816-as-crime-changes,-so-must-policing-approaches) and  makes for a very interesting read.  I have quoted it on countless occasions during presentations and training session deliveries, since publication.

This shift in focus is well received by many in various different sectors, because with ever shrinking resources and capabilities in law enforcement and government agencies, if more can be done to prevent the crime happening in the first place, then those limited resources can then focus on those crimes that couldn’t be prevented, and will likely be sophisticated and complex enough to warrant more specialist resource.

Mostly this can be done with simple steps and advice given to SME’s (Small to Medium Enterprises) and members of the public, such as simply enabling encryption on devices, having good password habits and policies, and keeping software up-to-date and patched (which funnily enough, echoes the Government’s advice found at www.cyberstreetwise.com).
This is great and something that I have been encouraging and pushing for over a year now, but will take time to really find wide-spread engagement and positive behaviour change, or even just increase in awareness.

What does all this data security mean for post incident forensics?

Is this all positive though?  Well in truth, not entirely, and it is a problem that could be found related to a number of recent high-profile court battles and debates over device access and encryption (naming no names).

The problem that this increase in security and data protection will bring is that once someone suffers an attack, or if criminals begin to implement strong security regimes into their criminal data, then will this pose difficulties for forensic investigators and analysts who are trying to access the data?

The answer is, almost undoubtedly.  With every challenge faced by digital forensics, solutions and alternative methods are researched, devised and developed – especially with such a supportive, innovative and enthusiastic community of forensics experts out there.  However, I don’t doubt that there will be a period of time ahead of us all where, until such new methods are devised, more and more instances of not being able to retrieve vital data or follow lines of enquiry to their conclusion will likely happen.  This is going to frustrate forensic analysts, especially with the likely restrictions that will be imposed on “alternative or untested” methods with the implementation of ISO 17025 standards.  It just means that research and development of ways around a problem will likely take longer and be less dynamic in nature.

(And yes, whilst I could talk for days on the ISO 17025 standard in digital forensics, I’m going to avoid discussing it here on this occasion.)

In Summary…

Improvements in security for all of us is a great thing to happen, and is desperately needed to protect both our data and that of others.  Removing the risk of data breaches or successful attacks will protect businesses and individuals, be a huge benefit to the economy and help those protecting us over in law enforcement by allowing them to focus on those crimes that cannot be easily prevented, rather than those that could have been.

However, it is a double-edged sword in that these improvements could hinder forensic investigations into data both in civil and criminal investigations, potentially reducing the likelihood of successful results and conclusions in those investigations.

It will be a frustration those of us in the industry will likely be burdened with for some time to come, but one that will be understandably brought to us all for the benefit of protecting the data in our society.  We can just hope that the trade-off is ultimately worth it.