{"id":211558,"date":"2017-02-27T04:04:10","date_gmt":"2017-02-27T09:04:10","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/spooked-by-cyber-extortion-spike-businesses-stockpile-bitcoin-top-tech-news.php"},"modified":"2017-02-27T04:04:10","modified_gmt":"2017-02-27T09:04:10","slug":"spooked-by-cyber-extortion-spike-businesses-stockpile-bitcoin-top-tech-news","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/bitcoin-2\/spooked-by-cyber-extortion-spike-businesses-stockpile-bitcoin-top-tech-news.php","title":{"rendered":"Spooked by Cyber Extortion Spike, Businesses Stockpile Bitcoin &#8211; Top Tech News"},"content":{"rendered":"<p><p>U.S. corporations that have long resisted bending to the demands  of computer hackers who take their networks hostage are  increasingly stockpiling bitcoin, the digital currency, so that  they can quickly meet ransom demands rather than lose valuable  corporate data.  <\/p>\n<p>    The companies are responding to cybersecurity experts who    recently have changed their advice on how to deal with the    growing problem of extortionists taking control of the    computers.  <\/p>\n<p>    \"It's a moral dilemma. If you pay, you are helping the bad    guys,\" said Paula Long, chief executive of DataGravity, a    Nashua, N.H., company that helps clients secure corporate data.    But, she added, \"You can't go to the moral high ground and put    your company at risk.\"  <\/p>\n<p>    \"A lot of companies are doing that as part of their incident    response planning,\" said Chris Pogue, chief information    security officer at Nuix, a company that provides information    management technologies. \"They are setting up bitcoin wallets.\"  <\/p>\n<p>    Pogue said he believed thousands of U.S. companies had prepared    strategies for dealing with hacker extortion demands, and    numerous law firms have stepped in to facilitate negotiations    with hackers, many of whom operate from the other side of the    globe.  <\/p>\n<p>    Symantec, a Mountain View, Calif., company that makes security    and storage software, estimates that ransom demands to    companies average between $10,000 and $75,000 for hackers to    provide keys to decrypt frozen networks. Individuals whose    computers get hit pay as little as $100 to $300 to unlock their    encrypted files.  <\/p>\n<p>    Companies that analyze cyber threats say the use of ransomware    has exploded, and payments have soared. Recorded Future, a    Somerville, Mass., threat intelligence firm, says ransom    payments skyrocketed 4,000 percent last year, reaching $1    billion. Another firm, Kaspersky Lab, estimates that a new    business is attacked with ransomware every 40 seconds.  <\/p>\n<p>    \"If you're hit by ransomware today, you have only two options:    You either pay the criminals or you lose your data,\" said Raj    Samani, chief technical officer at Intel Security for Europe,    the Middle East and Africa. \"We underestimated the scale of the    issue.\"  <\/p>\n<p>    Hackers often send out email with tainted hyperlinks to broad    targets, say, an entire company. All it takes is one computer    user in a company to click on the infected link to allow    hackers to get a foothold in the broader network, leading to    hostile encryption.  <\/p>\n<p>    \"At least one employee will click on anything,\" said Robert    Gibbons, chief technology officer at Datto, a Connecticut    company that offers digital disaster recovery services.  <\/p>\n<p>    Law enforcement counsels U.S. businesses not to succumb to    ransom demands, urging them to keep backup copies of their data    in case of hostile encryption.  <\/p>\n<p>    \"The official FBI policy is that you shouldn't pay the ransom,\"    said Leo Taddeo, chief security officer for Crypt-zone, a    Waltham, Mass., company that provides network security. Until    2015, Taddeo ran the cyber division of the FBI's New York City    office.  <\/p>\n<p>    But practical considerations increasingly are dictating a    different approach. \"It's an option to pay the ransom to get    back up and running. Sometimes it's the only option,\" Taddeo    said.  <\/p>\n<p>    \"But it has downsides,\" he added. \"Paying ransom just invites    the next attack.\"  <\/p>\n<p>    Moreover, 1 in 4 companies that pay ransoms never get their    files restored, Gibbons said.  <\/p>\n<p>    The idea of rewarding extortionists with payment makes some    technologists see red.  <\/p>\n<p>    \"That makes me super mad,\" said Lior Div, chief executive of    Cybereason, a Boston-area cybersecurity company. \"There are    things that are unacceptable, and we need to fight them.\"  <\/p>\n<p>    Div and his company have done something about the extortion    epidemic. They built a product called RansomFree that claims to    detect 99 percent of all ransomware strains.  <\/p>\n<p>    So far, the free software has been downloaded 125,000 times,    the company says.  <\/p>\n<p>    As extortionists get more sophisticated, researchers say, they    are modifying their malicious code, their infection strategies    and the way they collect payments.  <\/p>\n<p>    Once they weasel their way into your network, they now take a    look around.  <\/p>\n<p>    \"They'll actually explore your system to see how much money    they can squeeze from you,\" said Andrei Barysevich, director of    advanced collection at Recorded Future.  <\/p>\n<p>    And they won't offer any sympathy, no matter how valuable the    encrypted data, even if lives are at stake, say, in a health    care network. They may even say they are doing nothing evil.  <\/p>\n<p>    \"They actually think they are on the moral high ground. They    think the companies should have paid more for security,\" said    Barysevich, who spoke at a presentation this week at the annual    RSA cybersecurity conference in San Francisco, which bills    itself as the world's leading gathering of cybersecurity    specialists.  <\/p>\n<p>    One of the reasons midsize and large companies are storing    bitcoin for emergency use is that extortionists, once they    succeed at penetrating a system, commonly give a deadline for    payment before destroying data. But victims can't rush out and    buy bitcoin in a day or two.  <\/p>\n<p>    \"It takes at times a week for (brokers) to process you,\"    Barysevich said.  <\/p>\n<p>    Setting up the wallet ahead of time, Pogue said, allows    businesses an option that is quick, although perhaps repugnant.  <\/p>\n<p>    \"If they need to go to it, they are not spinning their wheels    standing up a bitcoin wallet,\" Pogue said.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the rest here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.toptechnews.com\/article\/index.php?story_id=123003UJD6QX\" title=\"Spooked by Cyber Extortion Spike, Businesses Stockpile Bitcoin - Top Tech News\">Spooked by Cyber Extortion Spike, Businesses Stockpile Bitcoin - Top Tech News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> U.S.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/bitcoin-2\/spooked-by-cyber-extortion-spike-businesses-stockpile-bitcoin-top-tech-news.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261455],"tags":[],"class_list":["post-211558","post","type-post","status-publish","format-standard","hentry","category-bitcoin-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/211558"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=211558"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/211558\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=211558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=211558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=211558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}