May 21, 2017

May 19, 2017

Subscribe to Latest Legal News and Analysis

Global Ransomware Attack: Preparation is Key

Businesses have been scrambling since Friday evening when news spread that a ransomware attack named WannaCry is compromising organizations at an alarming rate. In less than 48 hours, it has compromised more than 130,000 organizations worldwide in over 150 countries. Early investigative reports have suggested that this particular malware was among the tools held by the National Security Agency (NSA) employed to exploit system vulnerabilities in Windows which were leaked by WikiLeaks, for which Microsoft had released a patch for over two months ago. Experts expect additional attacks to occur due to residual system infections, copy-cat viruses or the release of additional malware arising from the NSA leaks. The recent attack could have been prevented by an update Microsoft previously made available to Windows users.

Despite warnings and update reminders, businesses frequently fail to implement available updates needed to protect their systems and data from new threats. Hackers know this fact and thus have launched the first of what is expected to be numerous attacks arising from the now publicized NSA tools. If nothing else, this recent event again brings home the critical importance of updating software and security systems in a timely manner. Given the seriousness of this hack, Microsoft has also released emergency patches for older, off-support versions of Windows. For any organization running Windows, it is critical that they ensure all applicable patches have been installed. The original patch and the emergency patches can be found at: http://www.catalog.update.microsoft.com/Search.aspx?q=KB4012598.

Many Windows servers and workstations still remain vulnerable and organizations must continue to apply the latest security patches. However, more compromises are expected with the start of the workweek.

Ransomware Persists as a Legitimate and Viable Threat

Even though some security experts predicted that ransomware attacks would recede this year, that is not happening and the NSA leak suggests there will be additional attacks. Entities such as multinational corporations, hospitals, or energy companies are attractive targets for ransomware due to the ability to infect multiple computers on a single network and encrypt valuable data. Moreover, up-dating system software and security programs can be more complex and costly for such entities given their sheer size, thus, exposing them to significant attacks based upon the vulnerability of their systems.

Ransomware is a form of malicious software that infiltrates computer systems or networks, encrypting data until the victim pays a ransom, which is frequently demanded in untraceable Bitcoin. The average ransom demanded in 2016 rose from $294 to $1,077 dollars.1 Most ransomware is generally spread when a user clicks on a malicious attachment in an e-mail or on a hyperlink. Two of the more significant ransomware threats in 2016 (“Locky” and “Cerber”) were spread via massive email campaigns. However, in this latest attack, the ransomware has been more successful through self-propagation, i.e., by gaining entry into businesses and automatically seeking out and infecting other vulnerable machines.

Preventative Measures to Mitigate Risk of a Ransomware Attack

Companies often fail to address the risk of ransomware until they are already the victim of an attack. However, by adopting a proactive rather than reactive strategy, and investing in a few key defensive practices, businesses can greatly reduce the threat of ransomware. A wide-spread attack of this nature should serve as a direct wakeup call to businesses of the importance of using supported software and keeping that software up-to-date. Staying on top of product patching is critical, especially when it comes to Microsoft products given the widespread deployment in businesses. It is especially critical to apply all patches that relate to known vulnerabilities. Organizations that had applied the March critical Microsoft Windows patches were not vulnerable to WannaCry. However, the NSA leaks revealed an alarming number of other vulnerabilities in Microsoft and other products as well. Several of which, like WannaCry, have been disclosed by hackers, thus, increasing the likelihood that such vulnerability will be exploited just like WannaCry.

Aside from good “cyber hygiene” including system patches and updates, employee education, training, and awareness about phishing attacks should be mandatory as ransomware often arrives through a phishing campaign. To supplement such training, we have developed a document to help personnel internalize good security practices, both at work and at home: An Individual’s Information Security Checklist.

Proactively creating multiple, secure, and physically separate copies of all servers, applications, and data is one of the most impactful preventative measures that will be vital in the event of an attack. Data must be regularly backed up and secured so that the backups are not connected to the computers and networks they are supporting.

For businesses that do not already have an incident response plan that has been vetted, tested, and deployed, now is the time to test and deploy one.

Responding to a Ransomware Attack

While there are a number of preventive steps that a business can take to mitigate the risk of a ransomware attack, there is no such thing as perfect or impenetrable security. Any type of business, whether based in the United States or abroad, is at risk and potentially vulnerable to an attack. No company is completely immune. If an organization finds itself in the unfortunate situation facing a ransomware attack, there are a number of best practices and response measures that can and should be promptly deployed. The steps taken during the initial minutes and hours following the attack are critical and have the ability to greatly reduce the overall impact to the organization, and its ability to recover its systems and data.

 


1 2017 INTERNET SECURITY THREAT REPORT, Vol. 22 (2017), available for download at https://www.symantec.com/security-center/threat-report

Steven M. Millendorf, Michael R. Overly, Jennifer Rathburn, Andrew Rawlins, Eileen Ridley, Beni Surpin, Aaron Tantleff also contributed to this post.

 

© 2017 Foley & Lardner LLP

TRENDING LEGAL ANALYSIS


About this Author

Christopher C. Cain, Foley Lardner, Transactional Securities Lawyer, Private Equity Attorney
Partner

Christopher C. Cain is a partner and business lawyer in Foley & Lardner’s Chicago and Madison offices. He helps clients tame technology vendors of all sorts (software, hardware, cloud, SaaS, social media). He represents private equity and strategic clients in mergers & acquisitions in a myriad of industries. He also represents high technology start-ups and is a co-founder of Catapult Chicago, a peer-sourced technology accelerator. Mr. Cain is a member of the firm’s Transactional & Securities, Private Equity & Venture Capital, Technology Transactions...

608.258.4241
Jennifer Hennessy, Foley Lardner Law Firm, Privacy Security and Healthcare Attorney
Associate

Jennifer J. Hennessy is a privacy and security and health care regulatory attorney with Foley & Lardner LLP. Her practice includes advising businesses on compliance with state and federal data privacy and security laws. She assists covered entities and business associates in complying with the HIPAA Privacy and Security Rules, and also advises businesses and individuals on compliance with state data privacy laws and federal law 42 C.F.R. Part 2, Confidentiality of Alcohol and Drug Abuse Treatment Records. She frequently guides clients through data incident management and the entire breach notification process, from the early stages of the investigation to the notification of affected individuals and state and federal government regulators. Her depth of experience in this area allows her to provide clients with practical and business-oriented solutions in the event of a data incident and in its aftermath. Prior to joining Foley, Ms. Hennessy was a health law associate with a large U.S. law firm based in Milwaukee.

617-502-3211
Chanley Howell, Intellectual Property Attorney, Foley Law Firm
Partner

Chanley T. Howell is a partner and intellectual property lawyer with Foley & Lardner LLP, where his practice focuses on a broad range of technology law matters. He is a member of the firm's Technology Transactions & Outsourcing and Privacy, Security & Information Management Practices and the Sports and Health Care Industry Teams.

Mr. Howell represents companies in a variety of technology law areas, such as:

  • Data Privacy and Security Compliance – Counsel and advise clients with respect to compliance...

904.359.8745
Julia Kadish, Foley Lardner Law Firm, Technology Drafting Attorney
Associate

Julia (Julie) Kadish is an associate with Foley & Lardner LLP where her practice focuses on drafting and reviewing technology agreements across a variety of industries, and counseling clients on privacy and data security matters, including data breach response and preparedness. She also has experience implementing corporate compliance programs from an initial risk assessment to implementation, training, and annual audits. Ms. Kadish is a Certified Information Privacy Professional (CIPP/US).

312-832-4911
James R. Kalyvas, Communication Attorney, Foley and Lardner Law Firm
Partner

James R. Kalyvas is a partner and transactional lawyer with Foley & Lardner LLP. Mr. Kalyvas advises companies, public entities, and associations on all matters involving the use of information technology, including structuring technology initiatives (e.g., outsourcing, ERP, CRM), vendor selection (RFP strategies, development and response review), negotiation, technology implementation (professional service agreements, SOWs, and SLAs), and enterprise management of technology assets. Mr. Kalyvas has extensive experience in structuring and negotiating outsourcing...

213.972.4542