14 tactics to use during a ransomware negotiation

3 years ago 426

Security researchers analyzed 700 incidents to recognize the economics of these threats arsenic good arsenic what bargaining tactics work.

Ransomware concept

Image: Rzt_Moster/Shutterstock

Be polite during negotiations, inquire for much clip and ever petition a trial record for decryption. Those are a fewer of the champion practices for dealing with a ransomware attack, according to a caller investigation of 700 incidents. 

Pepijn Hack, cybersecurity analyst, Fox-IT, NCC Group and Zong-Yu Wu, menace analyst, Fox-IT,  NCC Group wrote the probe paper, "'We wait, due to the fact that we cognize you.' Inside the ransomware dialog economics." The researchers explicate however adversaries usage economical models to maximize profits and what strategies ransomware victims tin usage to triumph much clip and trim the last outgo arsenic overmuch arsenic possible. The study is based connected 2 datasets. The archetypal consists of 681 negotiations and was collected successful 2019. The 2nd dataset consists of 30 negotiations betwixt the unfortunate and the ransomware radical and was collected from the extremity of 2020 and the archetypal fewer months of 2021.

Here's a look astatine what tactics enactment arsenic good arsenic however thieves acceptable the ransom figure. 

Negotiation strategies for ransomware attacks

In summation to analyzing the fiscal constituent of ransomware attacks, the researchers reviewed conversations betwixt the attacker and the victim. The afloat study includes quotes from existent conversations betwixt ransomware gangs and their victims. 

SEE: Fear and shame marque it harder to combat ransomware and accidental information loss, study finds

The researchers developed these strategies based connected failures and successes successful negotiations from ransomware cases they analyzed. They person proposal astir which dialog tactics to usage and astute steps to incorporated into the response.

The probe squad has this proposal for companies to instrumentality earlier starting the dialog process:

  1. Don't unfastened the ransom email oregon click connected the link; that's erstwhile the timepiece starts ticking.
  2. Think astir champion and worst lawsuit scenarios and however to respond to both.
  3. Set up interior and outer connection lines with elder management, ineligible counsel and the communications department.
  4. Research your attacker to recognize however the radical has handled ransoms successful the past.

If your institution decides to wage the ransom, the researchers suggest utilizing these negotiating tactics:

  1. Be respectful: This is simply a concern transaction, truthful debar making threats and permission emotions retired of it.
  2. Ask for much time: Adversaries are often consenting to widen the timer if negotiations are ongoing.
  3. Offer to wage a tiny magnitude present oregon a larger magnitude later: Bad actors privation to adjacent the woody rapidly and determination connected to the adjacent people and they volition sometimes hold to instrumentality little if they are paid much quickly.
  4. Convince the attacker you can't wage the afloat amount: The probe showed that the maneuver of perpetually stressing the inability to wage the ransom tin little the price.
  5. Don't uncover whether oregon not you person cyber security and don't store immoderate documents astir the argumentation connected reachable servers.

Finally, the analysts urge adding these steps to the process of responding to an attack:

  1. Set up a antithetic means of connection with the adversary.
  2. Ask for a trial record to beryllium decrypted.
  3. Ask for a impervious of deletion of the files. 
  4. Prepare for your files to beryllium leaked oregon sold.
  5. Ask however the atrocious histrion hacked your network.

How thieves acceptable the ransom

In summation to identifying adjuvant dialog tactics, the researchers studied however attackers acceptable the ransom figure. Each ransomware pack has created their ain dialog and pricing strategies meant to maximize their profits, according to the report. Also, galore attackers walk weeks collecting information from the target's network, including delicate information and  fiscal statements. Adversaries cognize however overmuch victims volition extremity up paying, earlier the negotiations adjacent start.

The researchers created an equation to foretell the outgo of a peculiar ransom. Elements of the equation include:

  • The last ransomware request connected case
  • The percent near aft exchanging the cryptocurrency to "clean" currencies 
  • The percent near aft paying the committee interest for the RaaS platform
  • The last determination made by the unfortunate connected to wage oregon not, zero if the unfortunate decided not to wage and 1 if the unfortunate did pay 
  • The outgo of carrying retired the attack 

Cybersecurity Insider Newsletter

Strengthen your organization's IT information defenses by keeping abreast of the latest cybersecurity news, solutions, and champion practices. Delivered Tuesdays and Thursdays

Sign up today

 Also spot

Read Entire Article