Counterterrorism Strategies Could Be the Key to Stopping Ransomware

Counterterrorism Strategy Could Stop RansomwareWith ransomware players, sophistication, effectiveness, and cost all on the rise, it may be time for us to take a page from counterterrorism to make it more difficult for cybercriminal gangs.

Ransomware is no longer something that just happens to “other organizations.” With cyber insurance claims up a whopping 422% in the first quarter of this year, payments at an all time high. Some cybercriminal gangs are now acting as VC investors for newer “ransomware startups,” it’s evident that threat actors are stepping on the accelerator pedal and aren’t looking back.

According to a new article by blockchain tech vendor, Chainanalysis, the answer to stopping ransomware could be found by using similar strategies as those utilized in counterterrorism.

In the article, they maintain collaboration is key – between military, law enforcement, intelligence agencies, public-private partnerships, using shared frameworks and watchlists:

If governments and cryptocurrency businesses brought together all of the intelligence they have on who’s carrying out and enabling ransomware attacks, they could put together a robust library of the most prolific operators, affiliates, third-party vendors, and money laundering service providers, along with the cryptocurrency data associated with these persons and entities (e.g., addresses and transaction histories). This combined threat reporting and resulting watchlist of known or suspected ransomware actors would give organizations around the world a shared understanding of who’s driving the most ransomware attacks at any given time, help all parties respond to attacks faster, and support efforts to arrest and sanction the worst offenders.

They also provide a summary of strategies and how they might be used to counter ransomware:

60e62e01f97a7d12a1c35ea7_ransomware ct table copy 1




























Source: Chainanalysis

I’m glad to see Security Awareness Training at the top of the list – it’s not just a means to educate users so they don’t click a malicious email attachment; it’s also the foundation for establishing a security culture within an organization by stressing the importance of personal cybersecurity hygiene and best practices.

I suspect we’ll begin to see this kind of intelligence sharing come to fruition soon; it’s needed and could be impactful.

Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 21 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Topics: Ransomware

Subscribe To Our Blog

Cybersecurity Awareness Month 2021 Free Resource Kit

Get the latest about social engineering

Subscribe to CyberheistNews