What is Cloud Ransomware? Cyber Terms Explained
Featuring: Tal Mozes, CEO & Co-Founder, Mitiga
So, if we start with ransomware and then go to cloud ransomware, in cloud there will be two different types: ransomware and extortionware.
Classic ransomware usually means that someone has encrypted your servers, your systems, endpoints, and most often your backups too. And in order to recover, you will need to retrieve an encryption key from the attacker, and usually it will take some time to decrypt all your data and it will cost you a lot of money, which is usually not covered by the insurance company as well.
With cloud ransomware, we usually are talking about file sharing systems. First, the attacker will encrypt your files locally in your computers, and then it will encrypt all the files on the file sharing systems that you're using. And again, will ask you to pay for the decryption key in order to decrypt your file so you can keep on working. It also might influence your backups, depending on how are those defined; because if you have an incremental backup, you might already have backed it up encrypted, so you might not be able to recreate it.
With extortionware, it's not about going back to business as usual and using your files. It's more about data that has been leaked and the attackers are extorting the organization to pay them a certain amount of money, usually in bitcoins or different cryptocurrency, in order to not publish the files that they have captured or were leaked and compromised. Those files usually will contain PII, private data on your customers, or anything else which could be sensitive to you.
It's very important to realize which data was leaked and when, if it's still valid and important for the organization, because it could be a very old data that we don't care about, or we care less than new generated data. It's also very important to understand the amounts of data that have been compromised. Sometimes it's a very small amount and the attacker is saying that this is just a sample of the data that has been leaked, even though it's the entire data they managed to capture.
Having the right logs and having the right controls to be able to understand quickly which data was leaked, where from, and when, is a key to have better negotiation. Getting those answers in minutes or hours will give you the upper hand after you have been breached. And also, it will help you to understand if you need to do breach notification, if you need to worry about your customers, third parties, comply with different regulations and so on.
Learn more about what it takes to combat cloud ransomware. Get the eBook.