• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Sophisticated ransomware – the answer lies beyond the perimeter

Kamal Brar by Kamal Brar
April 14, 2022
Photo by Sebastiaan Stam from Pexels: https://www.pexels.com/photo/person-s-gray-hoodie-1482476/

Photo by Sebastiaan Stam from Pexels: https://www.pexels.com/photo/person-s-gray-hoodie-1482476/

The growing frequency and intensity of cyberattacks have been pushing businesses to boost their cybersecurity defences. In August 2021, a ransomware attack on a specialist clinic in Singapore, potentially exposing the data of more than 73,000 patients, prompted the Ministry of Health (MoH) to conduct a thorough review of the clinic's compromised IT system. The incident highlighted the fact that ransomware does not just lock down data, it also compromises consumer trust and can severely impede businesses.

According to PwC's recent survey, consumers have become more protective of their personal information, with data security having a far greater impact on brand trust than any other factor. However, only 38% of the respondents from Singapore agreed that “brands protect their data to a great extent.”

Unfortunately, with the ever-increasing sophistication of attacks, there is no silver bullet to ensure an organisation’s perimeter is 100% ransomware-proof. While preventive controls can help stop basic attacks, the only way to guarantee complete immunity is for the business to not be connected to the internet altogether.

Our reliance on digital and connected technologies across the entire economy – from point-of-sale (POS) terminals at small neighbourhood cafes to Artificial Intelligence (AI) and robotics-driven manufacturing processes – means being offline is realistically not feasible.

Businesses need to look beyond perimeter controls and consider how quickly they can remediate and get their business back up and running following an attack.

To do so, it is important to understand the two common methods attackers use to disrupt businesses and force them to the negotiation table: encryption and exfiltration.

Business paralysis with encryption

It is nearly impossible for a business to operate today without data.

This simple truth has been the principle guiding ransomware attacks and building their popularity since their inception in 1989 with the first-ever strain, PC Cyborg. While this rudimentary ransomware only demanded a payment of around US$500 and was distributed by floppy disk, its authors understood that if you lock up someone’s critical data, they will pay to regain access.

Since then, an entire economy has spawned, feeding off the desperation of companies suddenly staring into the abyss of days, weeks, or even months without access to critical data and systems that are required to operate their business.

According to a 2021 study by IDC, nearly half (44%) of the companies surveyed across the globe are willing to pay the ransom following a ransomware attack. Singapore is among the countries with the highest willingness, with 43% of the companies that are willing to pay the ransom in hopes of retrieving affected files, either internally or through insurance payout.

Source: IDC Security Services Global Incident Readiness Survey, 2021

Ransomware is among the highest-rising cyber threats in Singapore. Based on the latest report from the Cyber Security Agency (CSA), the country recorded a 154% increase in ransomware cases from 2019 to 2020. As the world continues to become increasingly reliant on digital methods, this number is only expected to grow. There is, however, a better way – particularly as there is no guarantee attackers will decrypt data, and paying criminals simply further incentivises future attacks on other organisations.

The key to rapidly recovering, without negotiating with criminals, is having comprehensive and up-to-date backups that allow organisations to effectively turn back the clock and restart operations from a “save point” prior to the infection. Implementing a modern backup system was also cited by the CSA as one of the preventive measures against ransomware, and encourages businesses to remain vigilant against such threats, along with ensuring good cyber hygiene.

Ransomware attackers are savvy and understand that backups ruin their business model. The more sophisticated strains now actively seek out backup data to hamstring recovery efforts and increase the likelihood the victim will pay. Immutable backup data, natively air-gapped, provides organisations with a “ransomware insurance policy” that helps business-as-usual resume as quickly as possible, massively reducing recovery times from several days to just hours.

Exfiltration pincer movement

One of the biggest evolutions in ransomware was the introduction of exfiltration capabilities, first seen in the wild in late 2019 with the variant, Maze. The pincer manoeuvre has introduced both stealing and encrypting data and is now the preferred tactic of ransomware groups around the globe.

By threatening to publish stolen data, attackers increase the urgency of the victim’s response while also raising the stakes of the attack’s consequences. In December 2020, information technology firm SolarWinds fell victim to a highly sophisticated breach, which exfiltrated the data of its clients with the SolarWinds Orion installed.

A website called SolarLeaks was created to sell the data stolen from the companies breached in relation to the SolarWinds attack. The CSA of Singapore then investigated the incident and advised the company on the measures that need to be taken after the breach.

In the immediate fallout of such an attack, the first few days are traditionally spent in sheer panic as the organisation attempts to identify what data was taken. Having visibility into exactly what files were stolen is critical to response efforts as it allows the business to understand whether any personally identifiable information (PII), financial data, or intellectual property was taken, and which additional authorities or regulatory bodies need to be notified.

Machine learning models applied against backup data can help significantly accelerate this discovery process and reduce the time it takes to understand the full scale of an attack from days to mere minutes. This allows impacted businesses to be notified quickly so they can take appropriate measures to protect themselves from potential fraud stemming from the stolen data.

These attacks are not going to stop anytime soon, and will, in fact, continue to evolve and become more sophisticated and disruptive as attackers aim to make recovery as difficult and costly as possible. While businesses can never be completely immune from the risks of ransomware, they can minimise disruption and ensure operations are back up and running as quickly as possible.

Related:  Network segmentation, extremely important amid rising ransomware attacks
Tags: Artificial IntelligenceKubrikmachine learningpersonally identifiable informationPwCransomwarerobotic-driven manufacturing processesSolarWinds
Kamal Brar

Kamal Brar

As vice president and general manager of Asia-Pacific and Japan for Rubrik, Kamal Brar is responsible for growing Rubrik’s business and expanding the company’s customer momentum across the Asia Pacific and Japan region. Brar is an entrepreneurial leader having successfully led some of the most successful disruptive technology companies across Asia Pacific & Middle East. His experience extends from managing large scale businesses with a broad range of high-value deals, and complex solution selling, to executing and leading the inception of cutting-edge technology start-ups in the region. He has held various leadership positions at Oracle, IBM, Hewlett-Packard, MySQL, MongoDB, Talend and most recently Hortonworks. His strong passion for software and building high-performance teams has enabled him to drive change and deliver significant value to customers focused on digital transformation. Brar holds a Bachelor of Computing & Information Systems from Macquarie University, Sydney and a Master’s in Technology Management from the University of New South Wales.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe