{"id":15165,"date":"2016-12-01T12:00:59","date_gmt":"2016-12-01T17:00:59","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6328"},"modified":"2018-09-18T09:05:24","modified_gmt":"2018-09-18T13:05:24","slug":"weak-link","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/weak-link\/15165\/","title":{"rendered":"The weak link in a rusty chain"},"content":{"rendered":"<p>A company\u2019s business stalls because of a cryptor. The affected documents are customer agreements, accounting records, and, most troubling, the annual financial report. Essentially, most data can be restored, but it\u2019s going to take time and resources. The head of the IT department is charged with assessing the situation, solving the problem, and reporting results to the board. By and large, her report will define the measures to be taken and identify those responsible for the incident.<\/p>\n<p>Strictly speaking, there was no need for an in-depth investigation. The scheme was simple: Almost all of the company\u2019s employees with publicly accessible addresses received an e-mail with the subject line \u201cUrgent! Relay to the accounting department!\u201d The body of the message contained threats of large fines to be imposed for failing to submit certain tax papers on time, and the attachment ostensibly incorporated a list of those documents. Naturally, several compassionate souls forwarded the letter to the head of accounting, who opened the attachment.<\/p>\n<div style=\"background-color: #e5f0ec;padding: 10px 25px;margin-bottom: 10px\">\n<table style=\"border-bottom: 0\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b style=\"color: #66948a\">Company profile<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><b>Name:<\/b><\/td>\n<td style=\"border-top: 0\">CJSC \u201cNeutrino\u201d<\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><b>Staff:<\/b><\/td>\n<td style=\"border-top: 0\">290 employees<\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><b>Business:<\/b><\/td>\n<td style=\"border-top: 0\">Electronic components supply<\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 1px solid black;padding-top: 15px\" colspan=\"2\">The company was founded about 15 years ago as a local branch of a major international manufacturer, but 6 years later it became an integrated supplier of electronic components. Over time, the company has grown into a permanent partner of many organizations, both commercial and government. The company also works with representatives of the military-industrial complex.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>The chief accountant\u2019s computer had a security solution installed, although some of its functions were apparently disabled. The company\u2019s CEO directly granted local administrator privileges to the chief accountant, and he was free to disable subsystems that he considered unnecessary.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The weak link in a rusty chain. #infosec #ransomware<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FBq1K&amp;text=The+weak+link+in+a+rusty+chain.+%23infosec+%23ransomware\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The criminals are now demanding ransom. The sum is not exactly formidable, and the company won\u2019t go broke if it pays. But there\u2019s no guarantee that paying will help \u2014 and anyway, no one is really fond of being manipulated by criminals. Moreover, the IT director reasonably supposes that if the company pays, the sum of the ransom money will be deducted from her department\u2019s budget.<\/p>\n<h2>Which question is more important to answer: \u201cWho is guilty?\u201d or \u201cWhat must be done?\u201d<\/h2>\n<p>Actually the IT director faces a few choices. The incident may be explained by the shortcomings of the existing security system (antivirus was installed, but it failed to prevent the encryption), by acknowledging one\u2019s own mistakes (as the director of IT, she is responsible for the security of the company\u2019s information), or by blaming other people.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/12\/27084211\/weaklink_main_Sysadmin.jpg\" alt=\"\" width=\"1000\" height=\"667\" class=\"aligncenter size-full wp-image-20294\"><\/p>\n<p>In short, the IT director\u2019s options are one or more of the following:<\/p>\n<ul>\n<li>report that the infection happened because the chief accountant disabled subsystems of the security solution;<\/li>\n<li>blame the general lack of attention and awareness of employees who forwarded and opened the infected letter;<\/li>\n<li>admit her own blunder and suggest reorganizing security policies;<\/li>\n<li>use the situation as an argument for increasing the IT budget to implement advanced security solutions.<\/li>\n<\/ul>\n<p>The company has to solve the most urgent problem first: deciding whether to pay the ransom. Then, it\u2019s time to look at what happened, and how to prevent it from happening again.<\/p>\n<h2>At first sight<\/h2>\n<p>You don\u2019t need to be an expert to see that regardless of who is at fault, the company\u2019s employees overall do not have sufficient skills to counter \u2014 or even avoid \u2014 modern threats. Actually the scenario we presented is not unrealistic or even unusual. Observing modern companies unrelated to the cybersecurity market, we have found that about 30% of their employees are prone to falling for such tricks, even if their IT department regularly reminds them about dangers and threats.<\/p>\n<p>Therefore, what the staff actually needs is not another informational lecture, but practical training classes. Such training can reduce the number of successful infiltrations by 90% to 95%, with the share of users who can be tricked typically falling to less than 2%. Moreover, acquiring the necessary skills doesn\u2019t take much time, provided that the trainers know how to organize the classes.<\/p>\n<p>In addition, in our example, the malware was sent to all employees. As a rule, spammers use e-mail address databases for mass mailings. It is unlikely that addresses of multiple employees accidentally got on the same list. This is either a database leak or evidence that the addresses were carefully picked by someone. So it is worth considering whether the ransomware might have been a diversion, in which case a large-scale attack might be on the horizon.<\/p>\n<h2>Experts\u2019 comments:<\/h2>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Greg Dabney, analyst<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/12\/06020542\/avatar_blank.png\"><\/td>\n<td style=\"border: 1px solid #ddd;padding: 20px\">Of course, the company\u2019s employees who forwarded that message were careless. Tax agencies don\u2019t send e-mail blasts to staff about accounting department paperwork. But actually, people should be aware that such letters might come. Every employee needs to know about current threats, and the company\u2019s IT department has to ensure that everybody understands the danger. So I think the correct option is suggesting reorganization. Someone should commit to giving regular lectures on information security and telling everyone about the latest threats.\n<p>I\u2019m not sure about the ransom, because you need to carefully analyze the situation for any potential losses. If the data can be restored and the damage is mild then there is no need to pay. But if the lost documents prevent the company from meeting its obligations by failing partners or customers, you should take possible reputation loss into account. Then paying the ransom may be the only way.<\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Yuri Mironov, system administrator<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/12\/06020542\/avatar_blank-1.png\"><\/td>\n<td style=\"border: 1px solid #ddd;padding: 20px\">You can\u2019t blame IT specialists alone. If one person is responsible for every information security incident, that person must also have the appropriate authority. If some employees can simply change the settings of security products without letting IT people know, then no one should blame administrators. If there is a real business demand for giving such privileges, either that employee should have to sign a statement accepting all responsibility for his or her actions, or you need to consider the risks of such error. As for my experience, there\u2019s generally no need for this.\n<p>And I am convinced about not paying the ransom. First, hackers aren\u2019t bound to give the key even after getting their money. Second, data can be restored. Yes, at some expense, but repairing mistakes is rarely free. And third, if we pay money to extortionists, we sponsor further campaigns of encrypting malware. I don\u2019t recommend it.<\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-bottom: 0;border-collapse: inherit\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"border-top: 0\" colspan=\"2\"><b>Slava Borilin, security education program manager, Kaspersky Lab.<\/b><\/td>\n<\/tr>\n<tr>\n<td style=\"border-top: 0\"><img decoding=\"async\" style=\"width: 72px;max-width: none\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2016\/12\/06020542\/avatar_blank-2.png\"><\/td>\n<td style=\"border: 1px solid #ddd;padding: 20px\">There\u2019s no use talking about fault. In this situation, none of the actors of the drama bears all of the responsibility \u2014 neither the ones who forwarded the letter nor the CEO. These days, information security concerns everyone from IT staff to janitors.\n<p>However, an IT department isn\u2019t always up to the task of informing colleagues about threats. IT staff have immediate duties to fulfill, and education requires special skills and expertise. It is unwise to assume that if you gather people in a room twice a year to tell them that cybersecurity is terribly important, they will learn to be careful. Moreover, you can\u2019t speak at the same level with all people.<\/p>\n<p>We believe that professionals should do it \u2014 trained professionals who have honed approaches for different groups of employees and the ability not just to talk but to teach. Pros who have their own programs for each level of the company\u2019s organizational structure.<\/p>\n<p>Speaking about the ransom, you should first find out if there is any possibility of decryption. Some cryptors that claimed to possess strong, uncrackable keys have been deciphered anyway. And there are public free tools that may help. You can start by looking for them <a href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\" rel=\"noopener nofollow\">on this site<\/a>. If you are not lucky enough to find a decryption tool, assess the situation calmly and thoroughly \u2014 but ultimately, our company doesn\u2019t recommend paying.<\/p><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n","protected":false},"excerpt":{"rendered":"<p>A company&#8217;s business stalls because of a cryptor. The head of IT dept is to solve the problem. But &#8220;solving&#8221; this time doesn&#8217;t mean just &#8220;restoring the data&#8221;.<\/p>\n","protected":false},"author":700,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2501,1680,388,420,97,1795],"class_list":{"0":"post-15165","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-business","7":"category-smb","8":"tag-case-study","9":"tag-cryptors","10":"tag-infosec","11":"tag-ransomware","12":"tag-security-2","13":"tag-training"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/weak-link\/15165\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/weak-link\/4358\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/weak-link\/15165\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/weak-link\/15165\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/case-study\/","name":"case study"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15165"}],"version-history":[{"count":5,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15165\/revisions"}],"predecessor-version":[{"id":20296,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15165\/revisions\/20296"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}