I've grudgingly come around to the notion that there is only one way out of the ransomware problem: Make paying a ransom illegal. This is not very different from laws that make it illegal for US companies to pay bribes to foreign officials.

I really don't see any other way out of this mess. Yes, some victims will unfortunately ignore any laws that say they can't pay, but enforcement probably will not be hard.

What will be difficult are the situations where peoples' lives are at stake in ransomware incidents This sounds callous, but we can't afford to take the short view here anymore, and our other alternatives aren't great either.

I'm quite certain this is an unpopular view, but we have already seen the cost of doing nothing. At least in the interests of congruity for our financial sanctions vs Russia, we should probably make this change sooner rather than later.

There are 100 ways the current ransomware problem can and probably will get worse and nastier. Every single cybercriminal or aspiring crook is now focused on ransomware or data ransom payments as THE path to financial success. It's no longer just the Russians. It's the Chinese, the North Koreans, and Iran.

Either way, these countries don't just want to hurt the United States: They would rather the US died in a fire. For companies to make payments to these regimes -- and their cybercriminal apparatus is always part of the regime -- is bonkers, IMHO.

In re the idea of how this could all get a lot worse....10 years ago, if a company's employee clicked a malicious link or opened a booby trapped attachment, that company and that employee would have a bad day, or week, or month, or however long it took brainiacs in that organization to realize that some intruder was leeching off their bandwidth, or access, or whatever. At worst, the victim organization had all of that employee's browser credentials stolen. Maybe their machine was a botnet proxy, or relaying spam for a few days. Big deal.

We had a really nice period of maybe 3 years between the emergence of ransomware that tried to get victims to pay in $100 Greendot card increments to the explosion of bitcoin and the acceptance of on-roads to the US financial system, which is what ultimately what made large-scale corporate ransomware raids a thing.

@briankrebs thanks Satoshi Nakamoto real great gift you gave the world.

@briankrebs If only those same companies took researchers seriously when they report the issues that are later exploited.

Ask me how I know.

@briankrebs

Many countries already have laws against moving money for the purpose of money laundering or supporting terrorism and organized crime, I'm reasonably sure these could already be used for exactly this purpose.

@Daveography @briankrebs We should ban cryptocurrency under that rationale because it’s used for those purposes whenever it’s used for ransomware payments…and it’s used more directly for that all the time. Look how it’s been used to funnel money to Hamas recently for example.

@briankrebs
To some extent it's a problem of political will and international law, isn't it?

If the APT is a state organization, then it's a state action. If they're military, it's a military action by a foreign country. If they're state-sponsored, they're analogous to funded guerilla groups or privateers, and so on.

It seems to me that the apparatus to deal with it is largely there if the international community decided to treat computer incursions analogously to physical ones.

@jeffc @briankrebs The only problem is that treating computer incursions as the same as physical ones would leave the world at nuclear conflict in a week :(
@mybarkingdogs
It does seem like it might be a good idea to get everyone on the same page about it rather than, say, one country thinking it's no big deal while another treats it as a full-scale invasion.
@briankrebs
Rudyard Kipling's Verse, Inclusive Edition, 1885-1918/Danegeld - Wikisource, the free online library

@briankrebs I think you're tying into the proper a analogy here. These are attacks by foreign adversaries on Americans. There's an apparatus for dealing with this, but it's suck in the oil age and there's no one to bomb.

Like you can't just decide to go to a battlefield and fight on one side or the other. Ransomware needs to be given the same treatment. It should be state department and dhs funded, centrally managed, defense.

Leaving individuals and companies to try to deal with international warfare isn't going to go well.

In the past month, ransomware assholes have shut down emergency rooms at multiple hospitals; dinged the US bond market; major shipping ports in Australia closed, e.g. We used to talk about a hypothetical scenario in which cybercriminals are having real-world, kinetic impacts. But that stuff is old news. Kinetic impacts from ransom incidents now happen on a daily basis.
@briankrebs I don’t know why cryptocurrency is legal
@vyodaiken @briankrebs this is why I will vote for Elizabeth Warren until the end of time.
@briankrebs
Ransomware Douchebags would be a good punk band name.
@briankrebs my city (Dallas) recently had entire government agencies disrupted for months due to a ransomware attack. The library couldn't issue new cards, accept returned books, etc.

@briankrebs this is a clear sign that security is not nearly where it should be.

i don't just mean credentials and login methods, but also include the edge devices (routers, switches, etc), the OS on this devices, and the devices in the field.

as long as the "rush deploy, patch later (if at all)" mindset continues, this will never end.

@moving_target01 @briankrebs
Security does not seem to scale well. As long as security is seen as a task for a few people in an organization it will not stop every if you add layers of security. You might end up having twenty 2FA tokens which are vulnerable themself. And a UX where every redflag info (URL bar shortend, E-Mailheader hidden) is removed from our eyes.

@0815 @briankrebs I fully agree that security is seen as a task that a few people are supposed to handle, but also make it easy for non-technical people to use. That alone has the potential to limit the effectiveness of any security measure put in place.

But, I'm speaking largely of hardware that is released with minimal/no penetration testing performed. And that same hardware gets a few (at best) firmware updates... like the overwhelming majority of IoT devices, or consumer grade wireless access points.

That mindset is very much "a device will be released, and obsolete in 2-3 years" so the manufacturer is training the consumer to accept the near constant replace/upgrade mentality... Apple and Google are both notorious for this, as are many mobile devices makers like Samsung.

Because profit over all...

@0815 @moving_target01 @briankrebs Clicking on a malicious link should be safe. That it is not is a problem.

@briankrebs that's only the symptom though. It's easier than selling the exfiltrated data to others. If you shut down the ransom part I bet the criminals are going to go that route.

The problem is that hospitals, ports, governments, ... are running unsecurable systems. If your business depends on 445/tcp being open from your desktops and your security provider gets money for ticking boxes on a checklist, then you are the problem.

Ransomware Negotiation | Get the Help You Need Now

A comprehensive package of services for assessing and responding to ransomware attacks, including negotiation with threat actors and OpSec response.

I really admire what Bruce Schneier has said about the pay-or-not-pay debacle that ransomware puts companies and individuals in. Because it aptly summarizes the counterpoint to outlawing the payment of ransomware: I'm paraphrasing from memory here, but it was something to the effect of, "it's your data, or your daughter." In other words, the imperative to pay is directly related to your skin in the game.
In re the "how ransomware could possibly get worse" response, I have two scenarios (which we have already seen in the playbook/arsenal of ALL of the regimes already mentioned): Deleting data (forget ransoming it: you already pwn the servers); corrupting it (holy crap what blood type is this patient????).

@briankrebs the second case is why EHR is one of the few good uses for blockchain

When you absolutely must be able to verify the validity of a document

Also a great reason for off-line backups to become standard again

@RandomDamage @briankrebs
Since data can’t be changed on the blockchain, the method of updating information works be replacing old items with new. What’s going to stop the hackers from putting bad new (superseding) info on the blockchain?
@briankrebs I can't believe that anybody's going to give blood without typing it then and there, and if they can't, they'll give 'em o+.
@briankrebs It also speaks to the general notion that they wouldn't do it if someone wasn't willing to pay for it. Data theft is awful regardless.
Long time fan of yours Mr krebs, have a good evening.

@briankrebs sad but true, enforcing common sense by law should be the last resort, but i believe we are there.

I've seen many tabletop exercises that ended with the payment option as the first option, and that was just a simulation!!!
In reality I'm sure that they would just do it without thinking about the consequences.

@briankrebs More effective law enforcement would also be good.
@briankrebs I came to the same conclusion a while back, and suggested that the existing legal framework of sanctions is well-positioned as a basis for implementing it, since it already works to target criminal organisations and is robust against funnelling through an intermediary.

@briankrebs Unless there are more than fines for companies, a company will say, ā€œbetter the risk of prosecution than going out of businessā€ and pay the fine. And if it goes to a jury, they’re likely to be sympathetic.

You might have more luck outlawing blockchain-based monetary systems.

@vnangia seriously. if they can't anonymously take the payments, they can't function.
@vnangia Making it illegal will not prevent victims from paying. That is true. But, their willingness to pay is likely to be somewhat dependent on the willingness of law enforcement agencies to enforce the law. Your concern seems to impact very small companies that would flout any federal laws on this regardless (either out of ignorance or certainty of not getting caught).
@briankrebs Depends on industry. Can I see a Exxon or JP Morgan doing it? No. Can I see, I dunno, Medstar or Inova doing it? Yes. A school district or Krogers? Maybe.
@vnangia In any case, you don't need to go after the little guy to make an example.
@vnangia @briankrebs Yes, outlaw cryptocurrency! There really isn’t anything good or useful about it and there are lots of harms including (not limited to) how it facilitates ransomware.
@briankrebs we need strong government support for cybersecurity, and probably other unpopular reforms to support that
@briankrebs I agree with this. I hate it, but I agree with it. It's a practical necessity.
@briankrebs IANAL to I don't know, but I've considered the same, and would be very interested to read an analysis contemplating this approach and if there are unintended side effects. Attacking COTS software is like shooting fish in a barrel, so removing the incentive could make good sense. As you point out it's a serious matter and tough decision, but the status quo is completely untenable.
@lmk @briankrebs Attacking COTS software should be hard. That it is not is a major problem.

@briankrebs I’ve long thought that this is probably the only solution. Accept a short, sharply painful period now or accept the pain of it going on indefinitely.

At first they may even hit the first country that does this more heavily out of spite and to try to get the government to back down, but eventually they’ll switch their efforts to countries where victims can be expected to pay up.

@briankrebs

I've wondered why this hasn't happened yet. Cryptocurrency enabled this mess and banning all cryptocurrency seems unlikely so finding a way to ban paying for ransomware seems like the only option. Enforcement will be key. Banning it also means you can't get an insurance payment to cover the ransom.

Maybe beefing up backups, training and other recovery and prevention steps will make more financial sense. Or maybe it all stops with the payout much less likely.

@briankrebs I think outlawing cryptocurrency would have a better chance of being effective.

There are other ways to pass on currency but seemingly none as popular for cybercrime.

@beeoproblem Haha! I wish I shared your optimism. But of the two options, passing a law is way easier, IMHO.
@briankrebs I suppose. The window for that kinda closed ??? years ago now at this point.

@briankrebs We need black ice. Really good black ice.

Salutations to
#metaverse @GreatDismal

@briankrebs

According to Citizens United, Org A can pay Org B for ransomware via cryptocurrency money laundering, and because those orgs are people, this is a private transaction.

This is the #Insanity

@briankrebs There is zero chance of Congress enacting such a law. Maybe if you found and expelled all the members that are on the take you'd have a shot, but that ain't gonna happen either.

I hate to be that cynical, but when Putin praises the GOP and the Democrats aren't willing to cut Menendez loose, I see no other explanation for their behavior.

@briankrebs I can't discuss specifics but I was an observer to two very large companies that were hit in rapid succession with ransomware this year. I learned something I didn't expect. In both cases top executives received threats to their family's safety in a "pay or they die" proposition. Making it illegal to pay the ransom seems like the only choice at that point. Then, helping provide protection to people seems like a direct cost we'll have to deal with.
@DeweyOxberger I really can't argue with your point. I've been saying for a decade now that infosec peeps really really need to up their games in terms of physical security. I will never be so happy to be proven wrong.
@briankrebs Isn’t it already illegal to hold someone to ransom? Why can’t that be enforced? More control on crypto wouldn’t hurt since that’s what fueled ransomware.

@gadgetgav @briankrebs

I'd ban crypto before telling ransomware victims they're damned if they do and damned if they don't. If there's some other dependable way to collect ransoms without getting caught we can revisit the matter. Crypto is itself a ponzi scam so you'd be hitting two cuckoo weavers with one stone.

@buermann @gadgetgav Banning crypto sounds like a nice idea, but it's a tad difficult in practice nowadays. Banning payments is 100x simpler.

@briankrebs @gadgetgav

What'd be so difficult about it? The US Treasury seems to be able to exclude entire national economies from access to the dollar on any given President's whim, why couldn't they do that to crypto exchanges?

I was going to add "politically it ought to be more feasible than punishing the victims" but then I remembered this is America, so you're probably right that that's the only way.

@briankrebs @buermann I don’t see how banning payments will work though. There will be enough people who value the ransomed thing enough to break that law, so the driver for ransom will never dry up completely and the cost to the ransomware maker is negligible. No cost to them if the victim doesn’t pay and never gets access to their data.
And I didn’t suggest banning crypto, just some control of it. If it’s as good as its proponents claim, there should be no problem with some regulation.

Why would enforcement be easy? I’d think attaching a penalty to paying creates an incentive to not disclose incidents ASAP + work secretly to sweep it under a rug.

Maybe it’ll be easy to enforce the biggest piggy banks people could ransomware and perhaps that’s the point?

@briankrebs