Sentinel One Ransomw 2
Sentinel One Ransomw 2
Is it Ethical to Pay a
Ransomware Demand? 5
Is it Prudent to Pay a
Ransomware Demand? 7
Conclusion14
7 Lessons Every CISO Can Learn From the ANU Cyber Attack
Is it Ethical to Pay a
Ransomware Demand?
The real problem with the pragmatic approach, however, is that there’s no
agreement on how to objectively calculate the outcome of different ethical
choices. More often than not, the weight we give to different ethical choices
merely reflect our bias for the choice that we are naturally predisposed to.
Is it Prudent to Pay a
Ransomware Demand?
“We worked with law enforcement and IT security experts to assess all
options in executing the solution we felt was in the best interests of our
patients and in alignment with our health system’s mission. This included
purchasing a decryption key from the attackers to expedite system recovery
and help ensure patient safety.”
This “hard reality” perspective is reflected in recent changes made to the
FBI’s official guidance on ransomware threats.
“…the FBI understands that when businesses are faced with an inability to
function, executives will evaluate all options to protect their shareholders,
employees, and customers.”
However, the possibility that the criminals will not hold up their side of the
bargain must be factored into any decision about paying a ransomware
demand. In some cases, decryption keys are not even available, and in others,
the ransomware authors simply didn’t respond once they were paid. We saw
this to some degree with WannaCry. In the flurry of the WannaCry outbreak,
some victims paid and got keys, yet a large amount either never heard from the
authors, or the key pairs between victim and server were unmatched, making
per-user decryption impossible.
Also consider whether you have inventoried all possible backup and recovery
options. Many look no further than the Maersk shipping story during the NotPetya
attack to emphasize the importance of being able to rapidly restore one’s entire
infrastructure from backup. The most eye-opening realization for Maersk (and
indeed the entire industry) was that recovery depended on a happy accident: a
sole unaffected domain controller did not become infected due to a local power
outage where it was residing. Without that fortunate, coincidental event, it would
have taken exponentially longer to rebuild their entire infrastructure after 50,000
devices and thousands of apps were destroyed all at once.
Some hail this as a success story for backups, but shareholders and operators on
board the thousands of ships worldwide are quick to remind us that this incident
still cost the company well over a half billion dollars in the 6 months following the
incident. While backup and restoration are indeed critical, they are by no means
the primary basis for a strategy to address the threat of ransomware.
Finally, there is the worst case scenario, where you have no backups and no
recovery software, and you will have to dig yourself out by re-building data,
services and, perhaps your reputation, from the ground up. Transparency is
undoubtedly your best bet in that kind of scenario. Admit to past mistakes,
commit to learning those lessons, and stand tall on your ethical decision not to
reward criminal behavior.
What happens if I pay a ransom
for Ransomware Attacks?
And where do you go beyond that? Any sensible organization must realize the
need for urgent investment in determining not only the vector of that attack but all
other vulnerabilities, as well as rolling out a complete cybersecurity solution that
can block and rollback ransomware attacks in future. While these are all costs
that need to be borne regardless of whether you pay or do not pay, the temptation
to take the quick, easy way out rather than working through the entire problem
risks leaving holes that may be exploited in the future. Balance the need for speed
of recovery against several risks:
Finally, note that some organizations that get hit successively by the same actors
might have actually only been hit once, but encryption payloads may have been
triggered in subsequent waves. Experience pays off tremendously in all of these
scenarios, and ‘knowing thy enemy’ can make all the difference.
Conclusion
Along with the threat of extortion through data leakage, these recent
trends make it vital for organizations to invest in securing endpoints and
networks and preventing breaches from occurring in the first place through
AI-powered behavioral detection engines that do not rely on reputation nor
rely on cloud-connectivity. If you would like to see how SentinelOne can
help protect your business from ransomware and other threats, contact us
today or request a free demo.
We would like to thank Daniel Card and Chris Roberts for their assistance
with this whitepaper.
ABOUT SENTINELONE