Ransomware Remains a Big Problem
It should surprise no one that ransomware remains one of the biggest problems in cybersecurity these days. The Conti ransomware gang struck a prominent jeweler, and Babuk ransomware attacked MS Exchange servers. Although prominent attacks tend to feature high-profile targets, ransomware is increasingly costly for the average person. The problem has become acute enough that online criminals can provoke responses with hoaxes.
Governments are paying attention, though, and ransomware threat actors are having to adapt. Europol has stepped up operations targeting ransomware gangs. The US government has offered a $10 million bounty for information identifying leaders of the DarkSide ransomware gang. Consequently, some gangs like BlackMatter are renouncing ransomware attacks, for now.
There is unlikely to be a full solution to ransomware in the short term. Once people put valuable information on their computers, it becomes possible to hold that information ransom. Tactical and operational changes like increased scrutiny of ransomware will help on the margins. As long as governments like Russia are willing to run interference for ransomware gangs, the problem will abide.
China Is Signaling with Their Targets
Although this discovered several weeks ago, on Sunday American media noticed that the People’s Republic of China (PRC) built missile targets shaped like American aircraft carriers in the Gobi Desert. The missile targets are just the latest in a series of events that has caused much hand-wringing among American foreign policy experts. The situation with China remains tense but―despite the optics of some recent events―the situation is probably stable.
What seems to be happening is that both countries have no intention of attacking, but are afraid the other will. There is no reason to build a target visible from space for missile training; missiles aren’t aimed visibly. The target is pretty clearly intended as a message, and probably a defensive one at that. Other than nuclear weapons, carriers are the US’ most powerful threat to China, and only of marginal use―because of their vulnerability―in a defense of Taiwan.
I Took a Break
For the past two weeks I have not sent out an OSIRIS Brief, and I apologize for that. I try to keep posting, except when there is nothing to post or I simply cannot because of other constraints. The latter was true in this case, though thankfully my inability to post was not caused by anything terrible. I took the family on vacation. There have also been some developments that I may be able to share soon.
One thing I would like to gauge among readership is a willingness to support research financially. I do not plan to ever make the Brief or other publications paid, but I would like to hire a research assistant, which costs money. I am currently talking with a service that places assistants in the developing world to work at a distance, so the cost would be low, and hopefully create an opportunity for someone. My intent is not to make money but to provide content. If any of you have thoughts please let me know.
Noteworthy
Spot Those Black Friday and Cyber Monday Shopping Scams by McAfee
NOBELIUM cyberattacks revived: What you need to know now by ManageEngine
What’s it like to work as a malware researcher? by Tavella, Stefanko & Porolli
How to help children adapt to the digital world by Starikova
Understanding Attack Progression by Shackleford
Understanding the Phishing Ecosystem: Types of Phishing Kits by Bayliss
If Data Was A Football Team by Bridgwater
David Benson is a Professor of Strategy and National Security focusing on cyberstrategy and international relations. You can reach him at dbenson@osiriscodex.com.
To get more insightful analysis like this in your inbox at no cost please subscribe.
Ask a question! Raise an objection! Leave a comment!