17
Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington & Sutcliffe Darren Teshima, Orrick, Herrington & Sutcliffe

Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Preparing for a Ransomware AttackMCCA Global TEC ForumJune 19, 2017

Monica Patel, IBMAravind Swaminathan, Orrick, Herrington & SutcliffeDarren Teshima, Orrick, Herrington & Sutcliffe

Page 2: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

What is ransomware?

June 17Orrick | 2

• Malicious software

• Denies users access to systems or data

• Systems/data held hostage until ransom is paid

• Failure to meet demands could result in data deletion

Page 3: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Ransomware evolution

June 17Orrick | 3

Page 4: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Ransomware attack cycle

June 17Orrick | 4

Page 5: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Trends

June 17Orrick | 5

• $1 billion industry in 2016 and growing

• Bitcoin value up 3x

• Cryptoware Blockers

Page 6: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Reputational Impact is Costly

June 17Orrick | 6

56%40%

29%

Political Action (sign a petition,contact a politician

Stop/Reduce Technology Use Social Activity (post to socialmedia, write an op-ed or letter)

Source: Edelman Proprietary Study, 2014

Actions your customers take when you falter

74.8%

72.5%

80%

of consumers worry about the security of their personal information. Temkin Group "Consumer Benchmark Survey"

of consumers don’t believe organizations care about their private data and keeping it safe and secure.HyTrust Inc., the Cloud Security Automation Company

of consumers believe failure to keep customer information secure has a significant negative impact on trust in a company.Edelman Trust Barometer: Financial Services Industry

Page 7: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

To pay or not to pay…

June 17Orrick | 7

“The FBI does not support paying a ransom to the adversary. Paying a ransom does not guarantee the victim will regain access to their data; in fact, some individuals or organizations are never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to target other victims for profit, and could provide incentive for other criminals to engage in similar illicit activities for financial gain. While the FBI does not support paying a ransom, it recognizes executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers.”

Page 8: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Is it a breach?

June 17Orrick | 8

Where PHI is “encrypted as the result of a ransomware attack, a breach has occurred because the PHI encrypted by the ransomware was acquired … and thus is a ‘disclosure’ not permitted under the HIPAA Privacy Rule.”

Notification may not be required if the entity can demonstrate a “low probability that the PHI has been compromised,” • lack of attempted or actual data ex-filtration, • mitigation based on disaster recovery and data backups• use of appropriate level of encryption

Must be highly diligent in their forensic analysis and risk assessment to take advantage of the notification exception:

• Thorough investigation• Completed in good faith• Conclusions reasonable given circumstances• Documentation

Also consider state notification rules based on “access” to personal information, such as Connecticut, Florida, Kansas, Louisiana, and New Jersey

Page 9: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Violation of FTC Act?

June 17Orrick | 9

“A company’s unreasonable failure to patch vulnerabilities known to be exploited by ransomware might violate the FTC Act.”

-- (Then) Chairwoman Edith Ramirez (2016)

Failure to address “pervasive security bugs” that leave systems vulnerable to malware will be a key factor in the FTC’s decision to open an investigation or pursue an enforcement action.

Page 10: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Prevention Efforts

• Increase employee awareness of ransomware and role in protecting the organization’s data

• Patch operating system, software, and firmware on digital devices

• Automatic updates to antivirus and anti-malware solutions and conduct regular scans

• Manage use of privileged accounts—assign administrative access only where absolutely needed and necessary

• Configure access controls—users don’t need write-access to all information; read only ok

• Disable macro scripts from office files transmitted over e-mail

• Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations

Business Continuity Efforts

• Back up data regularly and verify the integrity of those backups regularly

• Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up

What to do?

June 17Orrick | 10

Page 11: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

1. Prepare

– End user education

• Consider performing periodic unannounced mock phishing exercises where the users receive emails or attachments that simulate malicious behavior

• End users should know who to contact and how to report possible ransomware attacks

– Have a clearly defined, up-to-date incident response plan

– Back up data regularly

2. Patch

– Good security hygiene

– Create internal corporate policies that require end users to update patches quickly

In-House Counsel – What Should You Consider?

June 17Orrick | 11

Page 12: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

3. Monitor

– Maintain current antivirus and/or end point protection

– Only grant permissions necessary that an end user requires to perform daily jobs

4. Respond

– Detect

– Analysis• Malware identification

• Root cause analysis

– Containment

– Recovery• Restore from back up

– Post-Incident Activity• What are the lessons learned?

In-House Counsel – What Should You Consider?

June 17Orrick | 12

Page 13: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

• Refresh incident response plan to address ransomware scenarios• Incorporate business continuity and disaster recovery plans into IRP• Conduct ransomware tabletop exercises• Engage forensic experts early; consider providers with ransomware

payment programs• Conduct regular risk and vulnerability assessments • Consider endpoint monitoring technologies• Insurance

Additional Considerations

June 17Orrick | 13

Page 14: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

• Cyber Extortion Coverage for Ransomware– Provides coverage for ransom payment– Subject to certain conditions, including:

• Insurer’s prior consent• Notification to law enforcement• Subject to a sublimit

– Definition of “currency”• Ensure it includes cryptocurrencies, like Bitcoin

Insurance Considerations

June 17Orrick | 14

Page 15: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

• Additional Cyber Coverages May Be Implicated– First-party coverages in event ransomware disrupts business or

destroys data, as opposed to simply locking down system– If ransomware is part of larger breach, and PII is compromised, breach

notification and third-party liability coverage may be implicated• Notice to Insurer of ransomware: Data breach may be considered

“related,” subject to a single retention. Without notice of initial ransomware, there is a risk the data breach costs may be excluded

• Check Non-Cyber Policies for Coverage: e.g., crime policies

Insurance Considerations (cont.)

June 17Orrick | 15

Page 16: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington

Thank You

16June 17

Monica PatelSenior Regional CounselIBM

T 415 545 3246

E [email protected]

Aravind SwaminathanPartnerOrrick, Herrington & Sutcliffe LLP

T 415 773 4286

E [email protected]

Darren TeshimaPartnerOrrick, Herrington & Sutcliffe LLP

T 206 639 9157

E [email protected]

Page 17: Preparing for a Ransomware Attack - €¦ · 19/06/2017  · Preparing for a Ransomware Attack MCCA Global TEC Forum June 19, 2017 Monica Patel, IBM Aravind Swaminathan, Orrick, Herrington