Перспективы программ-вымогателей

CC BY f
38-39
60
7
Поделиться
Десаи, Ш. (2022). Перспективы программ-вымогателей. Противодействие правонарушениям в сфере цифровых технологий и вопросы организационно-правового обеспечения информационной безопасности, 1(01), 38–39. извлечено от https://inlibrary.uz/index.php/digital_technology_offenses/article/view/7504
Шардул Десаи, компания Holland & Knight

Партнер

Crossref
Сrossref
Scopus
Scopus

Аннотация

До работы в Holland & Knight я девять лет работал федеральным прокурором в Западном округе штата Пенсильвания. Я занимался некоторыми наиболее важными делами Министерства юстиции о киберпреступлениях, в том числе преследованием Gameover ZeuS и Evil Corp. Оба были связаны с организованными российскими киберпреступниками, которые были связаны с одними из самых вредоносных вредоносных программ. У меня также есть опыт работы в области компьютерных наук и физики.

Похожие статьи


background image

Рақамли тeхнологиялар соҳасидаги ҳуқуқбузарликларга қарши курашиш ҳамда

ахборот хавфсизлигини таъминлашнинг ташкилий

-

ҳуқуқий масалалари

38

Шардул

Десаи

Holland & Knight

компанияси

партнери

(

АҚШ

)

ТОВЛАМАЧИ

-

ДАСТУРЛАРНИНГ ИСТИҚБОЛЛАРИ

Шардул

Десаи

Партнер

компании

Holland & Knight (

США

)

ПЕРСПЕКТИВЫ

ПРОГРАММ

-

ВЫМОГАТЕЛЕЙ

Shardul Desai

Partner at Holland & Knight (USA)

PERSPECTIVES ON RANSOMWARE

Prior to working for Holland & Knight I spent 9 years working as a federal

prosecutor in Western District, Pennsylvania. I handled some of the Department

of Justice’s most significant cybercrime cases, including a Gameover ZeuS and Evil

Corp prosecution. Both involved organized Russian cybercriminals who were
involved with some of the most pernicious malware. I also have a background in
computer science and physics.

Going over ransomware we are looking at financially motivated

cybercrimes. Cybercriminals are constantly evolving and changing their
technique. As we develop new techniques for finance on the internet

cybercriminals are finding ways to attack those methods.

In early 2000s we were working on E-Commerce, where people could buy

things online. The main cybercrime at that time was SQL Injection. That allowed
them to access credit card data on these websites. As time moved towards online
banking

cyber criminals became more sophisticated and moved towards

banking Trojans which allow them to steal individual’s usernames and IDs to

access the online banking sites and send the wire transcripts.

With the conversion of cryptocurrency and the movement towards it in the

late 2010s

we see the transition towards ransomware, allowing them to transfer

money through Bitcoin to the cybercriminals without having to deal with banks
and working with transfers. Overall there is a number of different financially
motivated cybercrimes, based on the industry and the technologies in this
particular industry.

Ransomware is a malware that will encrypt your system. When you get up

on your computer on your server

you won’t have access to anything and there

might be one file that you can access. The file will look similar to a locked system

that gives you instructions what to do and how to make payment in order to

decrypt. In the last couple of years’ cybercriminals also doing an exfiltration of


background image

Рақамли тeхнологиялар соҳасидаги ҳуқуқбузарликларга қарши курашиш ҳамда

ахборот хавфсизлигини таъминлашнинг ташкилий

-

ҳуқуқий масалалари

39

data engaging double extortion. Double extortion is essentially works for

ransomed payment, decrypting your data and not publish your data online. As you

can imagine for companies having a data published online is a significant concern

that impacts their trade secrets, communication and trust among their clients.

We are also seeing in the last couple of years’ ransomware as a service.

Cybercriminals aren’t simply engaging in ransomware, but they are packaging the

ransomware as a service and making it available to all people.

This has some unique effects. Most significant impact

it is casing a massive

increase in ransomware attacks, because no longer do sophisticated actors need to

have access to ransomware. As a result, in 2019 was a 485% increase in ransomware

attack and in the first half of 2021

93% increase. It mirrored with a lot of people

telecommuting and working from home and use ransomware as a service.

Here are some statistics:

From January to September 2021: ~ 500 million attempted ransomware

attacks (SonicWall)

2020: $312,493 average payment (Palo Alto Networks)

2020: $350 million payments (Chainanalysis)

This is a significant volume of money and it’s a significant successful business.

When you are hit with ransomware

your systems are down and you need

to hire a forensics team to immediately take measures, so you have lost time and

opportunity costs and you will spend a lot of efforts and valuable business hours

of your employees to get your system back to work. In addition, you are going to

have to engage in negotiation and payments. Often time it is overwhelming and

unknown to individuals. There are now third-party services to help on these

aspects. There is also a reputational harm and adverse media attention.

Legal considerations:

Data Breach Notification Laws. Companies must provide notices to

regulators, to individuals and that’s true across multiple jurisdictions, not only in

the US, and multiple countries are moving to that model.

Litigation and Regulatory Enforcement Action. There is a significant

increase in litigation for data breach matters and regulators are becoming far

more aggressive in investigating companies

victim doing ransomware.

Overall ransomware’s impact on vict

ims is significant time, significant lost

opportunity, significant headache and legal consequences and costs.

The last summer there was a major attack in USA, where there was a

significant impact on supply chain and national security matters. As a result, law

enforcement and government are concerned with the significant aggregate

economic harm that ransomware has and national security harm.

The other significant impact is the overseas actors and organized criminal

syndicates. Ransomware and cybercrime is unique in that and it requires a global

approach.

MLATs

Budapest Convention

Regulations on Cryptocurrency Exchanges.

inLibrary — это научная электронная библиотека inConference - научно-практические конференции inScience - Журнал Общество и инновации UACD - Антикоррупционный дайджест Узбекистана UZDA - Ассоциации стоматологов Узбекистана АСТ - Архитектура, строительство, транспорт Open Journal System - Престиж вашего журнала в международных базах данных inDesigner - Разработка сайта - создание сайтов под ключ в веб студии Iqtisodiy taraqqiyot va tahlil - ilmiy elektron jurnali yuridik va jismoniy shaxslarning in-Academy - Innovative Academy RSC MENC LEGIS - Адвокатское бюро SPORT-SCIENCE - Актуальные проблемы спортивной науки GLOTEC - Внедрение цифровых технологий в организации MuviPoisk - Смотрите фильмы онлайн, большая коллекция, новинки кинопроката Megatorg - Доска объявлений Megatorg.net: сайт бесплатных частных объявлений Skinormil - Космецевтика активного действия Pils - Мультибрендовый онлайн шоп METAMED - Фармацевтическая компания с полным спектром услуг Dexaflu - от симптомов гриппа и простуды SMARTY - Увеличение продаж вашей компании ELECARS - Электромобили в Ташкенте, Узбекистане CHINA MOTORS - Купи автомобиль своей мечты! PROKAT24 - Прокат и аренда строительных инструментов