{"581924":{"#nid":"581924","#data":{"type":"news","title":"Ransomware Threat Highlighted During Cyber Security Summit","body":[{"value":"\u003Cp\u003EAs part of the 14\u003Csup\u003Eth\u003C\/sup\u003E Annual \u003Ca href=\u0022http:\/\/www.iisp.gatech.edu\/georgia-tech-releases-2017-outlook-emerging-cyber-threats\u0022 target=\u0022_blank\u0022\u003EGeorgia Tech Cyber Security Summit\u003C\/a\u003E held Wednesday, College of Computing Ph.D. student \u003Ca href=\u0022http:\/\/www.cc.gatech.edu\/grads\/e\/edowning\/\u0022 target=\u0022_blank\u0022\u003EEvan Downing\u003C\/a\u003E, alongside GTRI Cyber Technology and Information Security lab division chief \u003Ca href=\u0022https:\/\/iisp.gatech.edu\/chris-smoak\u0022 target=\u0022_blank\u0022\u003EChris Smoak\u003C\/a\u003E, presented a seminar on ransomware.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn a presentation titled, \u0026ldquo;Ransomware: How to respond,\u0026rdquo; the two speakers discussed distinctions between ransomware and typical malware, the goal of those producing ransomware, and how to prevent it and respond to it.\u003C\/p\u003E\r\n\r\n\u003Cp\u003ERansomware is essentially just malware that holds data for ransom, demanding money in exchange for decrypting critical files. It can affect both individuals and larger networks utilized by entire companies.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EMany individuals opt to pay the ransom, but both Smoak and Downing recommend the opposite. Paying, they said, encourages more of this type of malware and, in addition, the user may not get their files back.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;Ransomware authors want to give their victims\u0026nbsp;incentive to pay. This is their business model,\u0026rdquo; said Downing, who is in his third year pursuing his Ph.D. in Computer Science.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;They want to be able to be reliable and trustworthy to decrypt their victims\u0026#39; files so that word will spread to other victims\u0026nbsp;that they should just simply\u0026nbsp;pay the ransom to get their data back. If the ransomware actors did not do this, then they wouldn\u0026#39;t be giving their victims any incentive to pay the ransom. The victims\u0026nbsp;would just simply wipe their hard drives,\u0026nbsp;reinstall their operating systems, and continue about their day.\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDowning, a self-described \u0026quot;unrealistic\u0026nbsp;conservative\u0026quot;\u0026nbsp;when it comes to the safety of online networks, said the decision whether to pay or not all comes down to a personal cost-benefit analysis.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;You want to decide what you\u0026rsquo;re willing to pay for, literally and figuratively,\u0026rdquo; he said. \u0026ldquo;What data can your business stand to lose? How quickly can your business recover from losing this data? How much money will an attack cost your company from\u0026nbsp;the lack of the\u0026nbsp;service your company provides? Is this all worth the risk of paying the ransom and possibly not getting your data back?\u0026rdquo;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDowning warns that regardless of your personal decision, it is never wise to pay the ransom.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026ldquo;Either you get your data back and you\u0026#39;ve\u0026nbsp;aided a criminal financially, encouraging them to continue attacking others, or worse, you don\u0026#39;t get your data back at all and you\u0026#39;ve still financially aided the criminal,\u0026rdquo; Downing said. \u0026ldquo;There\u0026#39;s an obvious common denominator here.\u0026quot;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EBoth Smoak and Downing recommended a few things to prevent against such an attack in the future. Aside from an extreme solution\u0026nbsp;(simply utilizing old, unconnected technology), they advised frequent backups of data and avoiding continual connection of backup volumes, training users on use of email and visiting\u0026nbsp;websites, and classifying data according to its importance (giving backup\u0026nbsp;priority\u0026nbsp;to the most vital information).\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Tech\u0026rsquo;s \u003Ca href=\u0022http:\/\/iisp.gatech.edu\/\u0022 target=\u0022_blank\u0022\u003EInstitute for Information Security and Privacy presents the Cyber Security Summit\u003C\/a\u003E annually. This year\u0026rsquo;s event was held at the Global Learning Center.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Georgia Tech experts detail the threat presented by ransomware."}],"uid":"32045","created_gmt":"2016-09-29 20:19:09","changed_gmt":"2016-10-03 19:22:39","author":"Ben Snedeker","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2016-09-29T00:00:00-04:00","iso_date":"2016-09-29T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"581926":{"id":"581926","type":"image","title":"Downing ransomware","body":null,"created":"1475180411","gmt_created":"2016-09-29 20:20:11","changed":"1475180411","gmt_changed":"2016-09-29 20:20:11","alt":"","file":{"fid":"221816","name":"DowningImage copy.png","image_path":"\/sites\/default\/files\/images\/DowningImage%20copy.png","image_full_path":"http:\/\/tlwarc.hg.gatech.edu\/\/sites\/default\/files\/images\/DowningImage%20copy.png","mime":"image\/png","size":884913,"path_740":"http:\/\/tlwarc.hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/DowningImage%20copy.png?itok=nYZh9DWS"}}},"media_ids":["581926"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[{"id":"133","name":"Special Events and Guest Speakers"}],"keywords":[],"core_research_areas":[{"id":"145171","name":"Cybersecurity"}],"news_room_topics":[{"id":"106361","name":"Business and Economic Development"},{"id":"71881","name":"Science and Technology"}],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003EBen Snedeker, Communications Manager\u003C\/p\u003E\r\n","format":"limited_html"}],"email":["albert.snedeker@cc.gatech.edu"],"slides":[],"orientation":[],"userdata":""}}}