Modern Australian
Men's Weekly

.

Hackers are now targeting councils and governments, threatening to leak citizen data

  • Written by Roberto Musotto, Research Fellow in Cyber Security and Law, Edith Cowan University

In recent weeks, Johannesburg’s computer network was held for ransom by a hacker group called Shadow Kill Hackers. This was the second time in three months a ransomware attack has hit South Africa’s largest city. This time, however, hackers didn’t pose the usual threat.

Rather than denying the city access to its data, the standard blackmail in a ransomware attack, they threatened to publish it online. This style of attack, known as leakware, allows hackers to target more victims in a single attack – in this case the city’s citizens.

Read more: What is ransomware and how to protect your precious files from it

The latest Johannesburg attack was the second leakware attack of this type ever recorded, and a similar attack could hit Australia soon. And although our current cyberattack defences are more advanced than many countries, we could be taken by surprise because of the unique way leakware operates.

A new plan of attack

During the Johannesburg attack, city employees received a computer message saying hackers had “compromised all passwords and sensitive data such as finance and personal population information”. In exchange for not uploading the stolen data online, destroying it and revealing how they executed the breach, the hackers demanded four bitcoins (worth about A$52,663) - “a small amount of money” for a vast city council, they said.

Hackers are now targeting councils and governments, threatening to leak citizen data The hacker group operated a Twitter account, on which they posted a photo showing the directories they had access to. ShadowKillGroup/twitter

In this case, access to data was not denied. But the threat of releasing data online can put enormous pressure on authorities to comply, or they risk releasing citizens’ sensitive information, and in doing so, betraying their trust.

The city of Johannesburg decided not to pay the ransom and to restore systems on its own. Yet we don’t know whether the data has been released online or not. The attack suggests cybercriminals will continue to experiment and innovate in a bid to defeat current prevention and defence measures against leakware attacks.

Hackers are now targeting councils and governments, threatening to leak citizen data This login screen message was displayed on computers in Johannesburg following the attack. pule_madumo/twitter

Another notable leakware attack happened a decade ago against the US state of Virginia. Hackers stole prescription drug information from the state and tried obtaining a ransom by threatening to either release it online, or sell it to the highest bidder.

When to trust the word of a cybercriminal?

Ransomware attack victims face two options: pay, or don’t pay. If they choose the latter, they need to try other methods to recover the data being kept from them.

If a ransom is paid, criminals will often decrypt the data as promised. They do this to encourage compliance in future victims. That said, paying a ransom doesn’t guarantee the release or decryption of data.

The type of attack experienced in Johannesburg poses a new incentive for criminals. Once the attackers have stolen the data, and have been paid the ransom, the data still has extractive value to them. This gives them duelling incentives about whether to publish the data or not, as publishing it would mean they could continue to extort value from the city by targeting citizens directly.

Read more: Ransomware attacks on cities are rising – authorities must stop paying out

In cases where victims decide not to pay, the solution so far has been to have strong, separate and updated data backups, or use one of the passkeys available online. Passkeys are decryption tools that help regain access to files once they’ve been held at ransom, by applying a repository of keys to unlock the most common types of ransomware.

But these solutions don’t address the negative outcomes of leakware attacks, because the “hostage” data is not meant to be released to the victim, but to the public. In this way, criminals manage to innovate their way out of being defeated by backups and decryption keys.

The traditional ransomware attack

Historically, ransomware attacks denied users access to their data, systems or services by locking them out of their computers, files or servers. This is done through obtaining passwords and login details and changing them fraudulently through the process of phishing.

It can also be done by encrypting the data and converting it to a format that makes it inaccessible to the original user. In such cases, criminals contact the victim and pressure them into paying a ransom in exchange for their data. The criminal’s success depends on both the value the data holds for the victim, and the victim’s inability to retrieve the data from elsewhere.

Some cybercriminal groups have even developed complex online “customer support” assistance channels, to help victims buy cryptocurrency or otherwise assist in the process of paying ransoms.

Trouble close to home

Facing the risk of losing sensitive information, companies and governments often pay ransoms. This is especially true in Australia. Last year, 81% of Australian companies that experienced a cyberattack were held at ransom, and 51% of these paid.

Generally, paying tends to increase the likelihood of future attacks, extending vulnerability to more targets. This is why ransomware is a rising global threat.

Read more: When it comes to ransomware, it's sometimes best to pay up

In the first quarter of 2019, ransomware attacks went up by 118%. They also became more targeted towards governments, and the healthcare and legal sectors. Attacks on these sectors are now more lucrative than ever.

The threat of leakware attacks is increasing. And as they become more advanced, Australian city councils and organisations should adapt their defences to brace for a new wave of sophisticated onslaught.

As history has taught us, it’s better to be safe than sorry.

Authors: Roberto Musotto, Research Fellow in Cyber Security and Law, Edith Cowan University

Read more http://theconversation.com/hackers-are-now-targeting-councils-and-governments-threatening-to-leak-citizen-data-126190

Someone Trips at Your Fundraiser. Now What? Understanding Public Liability for NFPs

Three months of planning. Volunteers giving up their weekends. Sponsorships chased, catering sorted, tables decorated. And then, about an hour into ...

Stainless Steel Tube: A Complete Specification Guide for Engineers, Project Managers, and Industrial Buyers

Few materials in the industrial and manufacturing world are as universally relied upon — or as frequently misspecified — as stainless steel tube...

How to Choose the Right Barber Shears Scissors for Professional Results

Since a barber is only as good as their tool, choosing the right barber shear scissor must not be taken lightly. Most barbers end up buying the first ...

Why Commercial Construction Companies Play A Critical Role In Modern Urban Development

Urban development requires highly organised planning, engineering expertise, and professional construction teams capable of delivering complex build...

Essential Features for Comfortable Family Caravan Trips

Choosing the right van for family travel requires careful consideration of how the space will be used on a daily basis. Families have specific needs...

Chatswood Tutor: Helping Students Achieve Academic Success With Personalised Learning

Education plays a crucial role in shaping a student’s future, and many students benefit from additional academic support outside the classroom. A pr...

How External Consulting Can Guide Enterprise IT Strategy and Procurement

Internal IT teams carry deep operational knowledge, but that familiarity can create blind spots in strategic decisions. An external IT consultant br...

Why Sports Nutrition Australia Is Important for Performance and Recovery

Athletes and fitness enthusiasts place significant demands on their bodies during training and competition. Maintaining energy levels, supporting mu...

How Body Contouring Bundoora Helps Improve Shape And Confidence

Modern aesthetic treatments have made it possible to refine body shape without the need for invasive surgery. One of the most popular non-surgical o...

Why Plantation Shutters Are a Stylish and Practical Choice for Modern Homes

Window coverings play a major role in the comfort, privacy, and overall design of a home. Homeowners often look for solutions that provide both visu...

Why a Retractable Hose Reel Is Essential for Efficient Water Management

Managing hoses efficiently is important for both residential and commercial environments. Whether watering gardens, cleaning outdoor areas, or maint...

Best Ways to Trade In Your Old Tech for Cash in Australia

Upgrading your mobile is exciting, but many Australians are left wondering what to do with the device they no longer use. Instead of leaving it in a...

Why Doctors in Bundoora Play an Important Role in Community Health

Access to quality healthcare is essential for maintaining a healthy lifestyle and managing medical conditions effectively. Visiting experienced doctor...

Backyard Aesthetics Decoded: Mediterranean, Coastal, Retro, Rustic, and Beyond

Backyard design has come a long way from a patch of lawn, a barbecue in the corner, and a few chairs chosen purely for practicality. Today, outdoor ...

What Stops a Home From Feeling Flat-Pack Generic

There is nothing wrong with convenience. Flat-pack furniture, fast styling decisions, and online checkouts have made it easier than ever to furnish ...

5 Best Dental Clinics in Beecroft, NSW

The best dental clinics in Beecroft, NSW are Beecroft Smiles Dental Surgery, Beecroft Elegant Dental Clinic, McConnell Dental, Dentistry for Life, a...

Executive Recruitment: Finding Leadership Talent That Drives Organisational Success

Hiring the right leadership team can significantly influence the direction and performance of any organisation. Strong executives bring strategic thin...

Understanding the Importance of Abrasive Blasting in Industrial Surface Preparation

Surface preparation is an essential step in many industrial processes. Whether preparing metal structures, removing old coatings, or cleaning equipmen...