Ransomware has made hacking a real job. This is how you need to respond Cybercrime has become big business. These days, you’re not protecting your information systems from a guy in his basement who hacks random websites for the thrill of it. You’re up against full-blown professional cybercrime “companies” that employ everyone from customer service reps to graphic designers.Brian Krebs recently published a story mentioning a “slick and professionally produced video advertisement” for a new ransomware-as-a-service package. What does this mean for IT professionals? It means cyberattacks are becoming more effective and more numerous, and you may need to change your security strategy.Why are cyberattackers going pro?Put simply, hacking is now a lucrative business due to changes in today’s technology landscape. For example, all of our businesses run on software and internet connectivity. We have become dependent on these technologies, and without them, things grind to a halt. Cyberattackers know both the value businesses place on their sensitive data and keeping their businesses running. It has, therefore, become worth their while to spend money and energy creating scalable and streamlined cyberattacking operations.In some parts of the world, hacking is the best use of technical skills. Economic challenges in countries like Russia, caused by falling oil and commodity prices, have driven more people with technical knowledge to turn to hacking as a way to make money. Furthermore, the process is getting easier as the payoffs get bigger. There are numerous tools, including vulnerability scanners and ransomware exploit kits readily available for free or for a reasonable price that make a cyberattacker’s job really easy. Additionally, more and more of the hacking process is automated, which means hackers need less technical skill to execute a successful hack.The evolution of cybercrimeImportant to note is that those involved in professional cybercriminal activity are not traditional cyberattackers. Cybercrime is now an “industry” with a well-defined ecosystem, role specialization, and all the trappings of any other industry. Those working at the “companies” in this industry fill such roles as creating and marketing the tools to perpetrate cyberattacks (e.g. creating malware kits, offering botnets for hire); stealing sensitive data with these tools; and collecting the pay outs.Take ransomware, for example. This fairly new subset of the malware market is like a business in any industry in startup mode—filled with rapid expansion and innovation.In fact, the ransomware market has become professionalized to the point that these “companies” are employing graphic designers and professional negotiators to streamline the process of explaining to victims their options and procedures in paying the ransom. They are actually conducting market research on the collections process to fine-tune the “presentation layer” of the ransomware transaction. And these criminals collaborate and share information often better than the companies and nations they are targeting. For example, they are creating and sharing sophisticated rating systems to judge the quality of malware tools.How should we respond?On the bright side, ransomware—especially as it gets more and more professional and effective—is a stimulus for businesses to get their act together when it comes to security. It might be cheaper to pay the ransom than restore the data once, but not to keep paying it over and over again. Overall, the situation is going to get worse before it gets better as businesses figure this out.The best defense is getting back to the security basics we’ve been talking about for years:Write high-quality software that’s not going to get easily hacked using common attack methods, like automated vulnerability scannersSet strong user controlsMinimize the surface area of risk by monitoring web applications and network proliferationEstablish good internal detection and response capabilitiesRemember, do not get complacent. Security is a moving target and the cybercrime pros have the time and resources to figure out new ways to breach your systems. The explosion of ransomware is probably due in part to the success of PCI regulations that have made stealing credit card information harder, forcing hackers to turn somewhere else. Cyberattackers are creative and will continue to move to where the risk/reward ratio is highest. Complacency is dangerous because the biggest risk long-term (as we saw in recent IoT-based DDoS attacks) is the creativity of adversaries to use emerging technologies in destructive ways that we have not yet anticipated. Related content opinion The ethics of creating secure software The permeation of software into every aspect of our lives makes it impossible to avoid. Software has transcended from a technical process into the realm of social morality. Therefore, the consequences are on a massive scale across the whole of societ By Chris Wysopal Sep 07, 2018 5 mins Enterprise Applications Security Software Development opinion Blockchain only as strong as its weakest link The blockchain might be secure, but is all the software interacting with it? In many cases, no. We’ve seen in an increase in cyberattacks due to vulnerabilities in the software side of the blockchain, from wallets to smart contracts to exchange By Chris Wysopal Aug 06, 2018 4 mins Blockchain Security opinion Keeping the Stars and Stripes secure Some of the most pressing threats to our national security are found not in the physical world, but in cyberspace. It's past time for our nation to adapt to the changing landscape and bring our security infrastructure up to speed. By Chris Wysopal Jun 15, 2018 5 mins Government IT Government Technology Industry opinion The good, the bad & the ugly of using open source code components Using these risky snippets of code has become standard for developers, but what do they actually think about them? By Chris Wysopal May 09, 2018 5 mins Application Security Open Source Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe