• Register
Return to: Home > News > Standards > Ransomware taking data hostage has given professionals the opportunity to prove their worth as ‘trusted advisors’

Ransomware taking data hostage has given professionals the opportunity to prove their worth as ‘trusted advisors’

The recent WannaCry Ransomware cyber-attack has plagued companies in 150 countries holding data for ransom and the accountancy profession was quick to react and offer the following roundup of advice to businesses. 

The malware that locks your computer until you pay a fee, in web currency Bitcoin, is not only a business data threat, but is also life threatening, with the high profile victim being the UK’s NHS.

Digital extortion has been around since 2005 but the most recent attackers have developed cryptware, which encrypts your files using a private key that only they possess. The Ransomware has a countdown clock stating all data would be deleted unless a payment was received.

PwC cybersecurity partner Marin Ivezic said that some clients had been working around the clock to restore systems and install software updates. He added that the attack has forced some more mature clients affected to abandon their usual cautious testing of patches to do unscheduled downtime and urgent patching, which is causing some inconvenience.

Deloitte Cyber Intelligence Centre associate director Paul Orffer told Engineering News Online that companies often saw paying a ransom as the easy way out. He advised: “The only way to recover from this is to do a complete reinstall and restoration of an affected company’s data, while simultaneously containing the malware.”

Orffer advised that even if a company receives the decryption key, these can also be a backdoor to a re-encryption, therefore companies need to be more vigilant. Ransomware attacks should be tackled through a triangle of people-process-technology, Orferr warned, to look at it in its entirety rather than only focusing on the technological aspect and blaming technology alone as the cause of the problem.

This latest ransomware initially charged companies $300 and Orffer said that this has now jumped up to $600. Orffer noted there were four Bitcoin wallets for this ransomware and across them there have been 262 recorded transactions, totalling $72,800.

EY global advisory cybersecurity leader Paul van Kessel said: “Cyber criminals are becoming more aggressive and sophisticated, simultaneously targeting all kinds of interconnected global organisations. A cyber criminal’s greatest ally is complacency, whatever the company size and if you don’t take cybersecurity seriously you are at significant risk.”

EY has urged worldwide organisations to take immediate action and recommended six steps:

  1. Disconnect infected machines from the network and take all backups offline to stop the spread.
  2. Activate an incidence response plan with a cross-functional investigation team, across all relevant departments.
  3. Identify and address vulnerabilities, such as installing security, updates, malware detection and anti-virus protection, so that attackers cannot re-enter and capabilities will be improved for future attacks.
  4. Ensure your systems are patched before powering up PCs and keep systems up to date with an enterprise-level patch and vulnerability management program.
  5. Activate business continuity plans by preparing data on requirements of their services.
  6. Collect and preserve evidence in a forensically sound manner for investigation.

EY global forensic tehnology and discovery services leader David Remnitz said: “Even after the data is restored, companies sometimes face allegations that sensitive personnel-related or other business information had been compromised. Third parties and other stakeholders may require the company to demonstrate forensically that data was accessed, but not stolen.”

KPMG Italy Advisory senior manager in information risk management Andrea Zapparoli Manzoni told Reuters: "The haphazard attack is distributed patchy. This particular ransomware contains a vulnerability, called Eternal Blue, which was developed in USA intelligence circles and was then stolen. That gives you an idea about why the level is risk is particularly high. The aim isn’t to hit any specific country but to strike as widely as possible to make money.”

The first targets are hospitals, according to Manzoni, as they are vulnerable and simply cannot afford to lose their data. BDO head of international cybersecurity Shahryar Shaghaghi agreed that every industry is threatened but especially healthcare organisations as their vulnerable security systems are easy to penetrate.

The severity of cyber threat is high and should be addressed at board level, and sufficient resources should be allocated to protect, detect, respond and recover, according to BDO. Companies do invest in security technology but that is being undermined by different attack methods meaning traditional methods are no longer enough.

Top Content

    Blockchain and the Big Four: does it deserve all the hype?

    Although still in its infancy, blockchain is one of the most talked-about technologies of 2018. Will the blockchain bubble burst, or will it live up to its reputation as the ‘new internet’? Eleanor Jerome investigates

    read more

    Malaysia: Ready to show its strength

    Recent changes have enhanced the quality of audit reports in Malaysia, giving the profession a welcome opportunity to demonstrate its value to clients. Paul Golden reports

    read more

    China: Regulating the Chinese dragon

    Harsh regulatory actions and looming US trade wars have been dampening expectations in a Chinese market still full of potential, finds Jonathan Minter

    read more

    Indigenous Australians: New checks and balances

    With fewer than 40 known qualified Indigenous Australian accountants, Jonathan Minter speaks to Shelley Cable from PwC Australia about how increasing this number is an important part of improving the financial literacy of Indigenous communities

    read more
Privacy Policy

We have updated our privacy policy. In the latest update it explains what cookies are and how we use them on our site. To learn more about cookies and their benefits, please view our privacy policy. Please be aware that parts of this site will not function correctly if you disable cookies. By continuing to use this site, you consent to our use of cookies in accordance with our privacy policy unless you have disabled them.