June 28, 2017 / 8:45 PM / 5 months ago

Ransomware reveals tech challenges past and future

NEW YORK (Reuters Breakingviews) - Who’d be in charge of a corporate IT network with hacks, phishing and now a double dose of so-called ransomware to contend with? Wednesday’s cyber attack hit targets from Ukraine to the United States and more than 60 other countries. Human error enables hacking of today’s network setups. A shift to the cloud reduces that danger, but brings others.

An illustration picture shows a projection of binary code around the shadow of a man holding a laptop computer in an office in Warsaw June 24, 2013. REUTERS/Kacper Pempel

The latest rogue software, a variant of something called Petya, locks computers and posts a message demanding $300 in bitcoins to recover the data. Like the WannaCry virus last month that hit National Health Service computers in the UK, among others, it gets into PCs using code known as Eternal Blue, which security experts believe was developed by the U.S. National Security Agency.

Monday’s attack hit Ukraine’s international airport, Russian oil group Rosneft, advertising giant WPP and FedEx’s TNT Express unit, among others. Its spread may have been limited, though, because after WannaCry many firms patched software including older Microsoft operating systems.

The fact that this wasn’t done earlier is a reminder that current IT architecture depends on people to maintain it. And people can let the bad guys in, too. Malevolent phishing emails abound. Though it was done in fun, the fact that the CEOs of Goldman Sachs, Citigroup and Barclays – not to mention the head of the Bank of England – recently responded to prank emails purporting to be from colleagues underlines the human factor.

The cloud, comprising infrastructure managed by the likes of Amazon, Alphabet and Microsoft, ought to be immune from much of this. Protection should be cutting-edge, for example, and advanced detection tools should be in place. Software run in the cloud doesn’t need users to update it. Data should be recoverable even if one copy is corrupted.

Yet there are new concerns, too. With today’s hybrid system, cloud-based software can propagate Petya or other malicious agents rapidly. A cloud outage can affect far more users than a cyber attack, as customers of Amazon found out in March when part of the company’s cloud went dark. Companies may need to hire multiple cloud-services providers to minimize this risk.

And of course cyber criminals and unfriendly state actors will simply set their sights higher. After all, holding the entire cloud to ransom sounds a lot more lucrative than targeting any number of individual computers.

Breakingviews

Reuters Breakingviews is the world's leading source of agenda-setting financial insight. As the Reuters brand for financial commentary, we dissect the big business and economic stories as they break around the world every day. A global team of about 30 correspondents in New York, London, Hong Kong and other major cities provides expert analysis in real time.


Sign up for a free trial of our full service at https://www.breakingviews.com/trial and follow us on Twitter @Breakingviews and at www.breakingviews.com. All opinions expressed are those of the authors.

0 : 0
  • narrow-browser-and-phone
  • medium-browser-and-portrait-tablet
  • landscape-tablet
  • medium-wide-browser
  • wide-browser-and-larger
  • medium-browser-and-landscape-tablet
  • medium-wide-browser-and-larger
  • above-phone
  • portrait-tablet-and-above
  • above-portrait-tablet
  • landscape-tablet-and-above
  • landscape-tablet-and-medium-wide-browser
  • portrait-tablet-and-below
  • landscape-tablet-and-below