Originally published in the Orange County Business Journal on August 28, 2017. Reprinted with permission.

Understanding what makes you unique.®

Handling Cyber Threats: Ransomware By: James P. Melendres and Lyndsey A. Torp Ransomware is a type of malware that encrypts or locks a company’s valuable digital files and demands a ransom to release them. These types of attacks are skyrocketing, with over 3 million attacks in 2015 exploding to 638 million in 2016. A recent study estimates that ransomware extortionists have made more than $25 million in bounties over the last two years. Given the recent and particularly dangerous wave of ransomware circulating throughout the United States, it is critical that businesses have cyber policies to deal with these threats, including specific policies for ransomware.

The fact that WannaCry was in most instances avoidable only serves to stress that businesses must develop cyber policies that include two main areas:

Once ransomware has been deployed, it encrypts files and folders on local drives, any attached drives, backup drives, and potentially other computers on the same network. The installed software permits hackers to load malicious programs which allow them to gather intelligence and gain control of systems on the network. Users and organizations are generally not aware they have been infected until they can no longer access their data or until they receive a message advising them of the attack and demanding a ransom payment in exchange for a decryption key. These messages include instructions regarding how to pay the ransom, typically via Bitcoins – a largely untraceable method for transferring funds.

• Disable macro scripts from office files transmitted over email.

1. Prevention; and 2. A cyber incident response plan (“CIRP”) that accounts for a ransomware attack. The FBI published prevention considerations, which include the following:

• Make sure employees are aware of ransomEmployees are often the weakest link from a ware and of their critical roles in protecting the security perspective, and likely targets for an organization’s data. attack. An employee may open an email addressed to them, and click • Patch operating system, on an attachment that appears software, and firmware on digital legitimate, such as an invoice, “Given the recent and devices through a centralized or click on a legitimate-lookpatch management system. ing URL. But the attachment particularly dangerous actually contains malicious Ensure antivirus and wave of ransomware •anti-malware ransomware code, or the URL solutions are set directs them to a website that circulating throughout to automatically update and infects their computer with the United States, it is conduct regular scans. malicious software. More recently, criminals bypass critical that businesses • Manage and limit the use the need for an individual of privileged accounts, such as have cyber policies administrative accounts. employee to click on a link, and instead seed legitimate to deal with these websites with malicious code, • Configure access controls, threats…” taking advantage of including file, directory, and unpatched software on network share permissions end-user computers. appropriately.

The recent WannaCry ransomware attack infected over 300,000 computers in over 150 nations. WannaCry was particularly problematic because it contained a worm component. It attempted to exploit vulnerabilities in a Windows server to remotely compromise systems, encrypted their files, and spread to other hosts. Notably, Microsoft had issued a patch to fix these vulnerabilities two months before the attack, but those affected had not updated their software to install the patch.

• Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations, such as temporary folders. A company should also maintain a CIRP that addresses ransomware as a distinct type of cyber attack. In particular, ransomware raises unique legal and operational questions distinct from those that arise in the course of “typical” data breach, including the critical question of whether to pay the ransom. Accordingly, in consultation with outside counsel, a company should ensure that its CIRP incorporates a decision-making framework that addresses the novel legal issues related to detecting, responding to, and limiting the effects of a ransomware attack. For more information about Cyber Security, Data Protection, and Privacy, please visit https://www. swlaw.com/services/cybersecurity-data-protection-and-privacy.

James P. Melendres is co-chair of the Cybersecurity, Data Protection, and Privacy practice and the White Collar Defense and Investigations practice. He focuses on cybersecurity incident preparation and emergency response, related regulatory compliance and civil litigation as well as white collar criminal defense and government investigations. Reach James at 714.427.7071 or [email protected]. Lyndsey A. Torp concentrates her practice on business litigation, real estate litigation, construction litigation, and franchise litigation in state and federal courts. In addition, she has experience in cybersecurity with particular focus on ransomware and cyber extortion. Reach Lyndsey at 714.427.7529 or [email protected].

James P. Melendres | 714.427.7071 | [email protected] Plaza Tower | 600 Anton Boulevard | Suite 1400 | Costa Mesa, CA 92626 Lyndsey A. Torp | 714.427.7529 | [email protected] Plaza Tower | 600 Anton Boulevard | Suite 1400 | Costa Mesa, CA 92626 Denver | Las Vegas | Los Angeles | Los Cabos | Orange County | Phoenix | Reno | Salt Lake City | Tucson

www.swlaw.com Snell & Wilmer is solely responsible for the content of this article.

Handling Cyber Threats: Ransomware - Snell & Wilmer

Aug 28, 2017 - or locks a company's valuable digital files and ... software permits hackers to load malicious ... updated their software to install the patch.

137KB Sizes 1 Downloads 234 Views

Recommend Documents

Handling Cyber Threats: Ransomware - Snell & Wilmer
Aug 28, 2017 - James P. Melendres is co-chair of the Cybersecurity, Data Protection, and Privacy practice ... intelligence and gain control of systems on the.

Snell&Wilmer
Sep 19, 2016 - service mark is the same as a trademark, but distinguishes services instead of goods. Trade dress is .... trademark cancellations and domain name disputes; and preparing manufacturing, consulting and technology contracts.

Snell&Wilmer
Sep 19, 2016 - Best to select a unique mark that is either an invented word with no meaning ... obtain state registration, regardless of the area of geographical use in the state. ... the mark and buy products based on the quality/reputation associat

Snell&Wilmer - JD Supra
Nov 15, 2016 - Many businesses ... internet searching software would likely be found to conflict with “Google.” III. ... banking or insurance, the records of the appropriate agency responsible for registering such names should be searched and.

Cybersecurity - Snell & Wilmer
Sep 30, 2016 - 25% of all of the data breaches that we hear about and ... when there is a data breach or cyber. DANIELLE ... no matter how small or large, can.

November 2016 - Snell & Wilmer
Nov 22, 2016 - the beneficent author of all the good that was, that is, or that will be; that ... such a degree of temporal prosperity as He alone knows to be best.

PRESS RELEASE - Snell & Wilmer
Jan 18, 2017 - Adobe. RealSource. Price-CCIM Scholarship. Katie Wilking Clinard ... that requires 100+ hours of training and considerable investment. Learn.

Snell&Wilmer - JD Supra
Nov 15, 2016 - “apple pie a la mode” is descriptive or generic of apple pie with ice cream. But, its acronym, “APALM,” would likely be considered a fanciful, ...

September 2017 - Snell & Wilmer
Sep 12, 2017 - (Cleaned up). Litigation—Slander ... App.5th 603 (2017), held that a plaintiff must make a ... in the amount of $1,000, plus costs and “including.

IP Stars - Snell & Wilmer
May 30, 2017 - In addition, he has worked with a number of technology clients to develop ... Throughout his career, Langton has prepared and prosecuted U.S. and foreign patent applications and handled large patent ... For more information,.

IP Stars - Snell & Wilmer
PHOENIX (May 30, 2017) – Snell & Wilmer is pleased to announce that for the third ... hardware, internet, business methods, solar tracking, financial services, ...

IP Stars - Snell & Wilmer
Jun 22, 2016 - biotechnical, mechanical, electromechanical, computer software, medical ... de-facto Chief Patent Counsel for several Fortune 500 companies. ... subterranean drilling, all aspects of automobile technology, semiconductor and ...

Ranking Arizona - Snell & Wilmer
Apr 17, 2017 - ... business leaders throughout Arizona, participated in an online opinion poll ... company's revenue and number of employees. About Snell & Wilmer. Founded in 1938, Snell & Wilmer is a full-service business law firm with ...

September 2017 - Snell & Wilmer
5 days ago - who created the writing or the law firm that employs the attorney? In Tucker Ellis LLP v. Superior Court, 12. Cal.App.5th 1233, 220 Cal.Rptr.3d ...

PRESS RELEASE - Snell & Wilmer
Salt Lake City, UT–March 6, 2017–The Utah Chapter of CCIM honored 16 individuals at its 2017. Excellence Awards event. Held at the Grand America Hotel on ...

Cybersecurity - Snell & Wilmer
Sep 30, 2016 - the last ten or fifteen years. Let's start ... and social engineering. To level set the ... it will help harden your networks ... (UAT) into a unique all-STEM institution that marries the best ..... part of larger systematic campaign.

September 2016 - Snell & Wilmer
Sep 27, 2016 - about my role in building an excellent Education Law practice and continuing to serve so many clients who work day in and day out to improve ...

Snell&Wilmer - JD Supra
Nov 15, 2016 - “apple pie a la mode” is descriptive or generic of apple pie with ice cream. But, its acronym, “APALM,” would likely be considered a fanciful, ...

Worldwide "ransomware" cyber attack hit 74 ... -
conference, "Project Treble" is designed to reduce the burden on phone makers looking to ... Hacking group used leaked NSA tool for global cyber attack.

by lmg - Snell & Wilmer
SNELL & WILMER PARTNER DANIEL S. WITTENBERG NAMED “LIFE SCIENCES STAR” BY LMG. DENVER (September 6, 2016) – Snell & Wilmer is pleased ...

IP Stars - Snell & Wilmer
Jun 22, 2016 - the technology, telecommunications, energy and pharmaceutical ... career, Grant has prepared and prosecuted U.S. and foreign patent ...

Snell&Wilmer - JD Supra
Sep 19, 2016 - your business or project to you; (b) require a written disclosure to you of .... Failing to Claim Larger Devices or Systems in Which the Invention ...

Partner Spotlight - Snell & Wilmer
Jun 23, 2016 - Email questions and reports to [email protected]. 1 ... rolled out our asset management platform .... his or her best abilities.

Partner Spotlight - Snell & Wilmer
Jun 23, 2016 - Email questions and reports to [email protected]. 1. It's a time of graduations, ... service contracts, caulking, etc., to name just a few typical items ... and JV boys basketball. Congrats to Skyline and keep up the good.