December 28, 2016 By Douglas Bonderud 2 min read

What’s worse than ransomware? Ransomworms. According to CSO Online, 2017 may be a rough year for information security teams. Combined with evolving cryptography and ransomware techniques, cybercriminals are hoping to burrow even deeper into corporate networks. Here’s a look ahead.

Preparing for Crypto-Ransomware

Ransomworms aren’t new. Back in May 2016, Graham Cluley and other cybersecurity experts reported on the rise of ZCryptor, a piece of ransomware that propagated across networks by copying itself onto removable media drives, such as connected USB sticks.

As CSO noted, ZCryptor may be the first iteration of a larger problem. According to Corey Nachreiner, chief technology officer (CTO) of WatchGuard Technologies, a ransomware/network worm mashup wouldn’t just infect attached devices, but “tirelessly copy itself to every computer on your local network it could reach.” Nachreiner also issued a warning for companies: “Whether or not you want to imagine such a scenario, I guarantee that cybercriminals are already thinking about it.”

And that’s just for starters. If criminals are able to steal network information before encrypting data and sending the worm on its way, they’re effectively able to compromise corporate machines twice.

In a nutshell, IT professionals can expect ransomware to dig deep and start worming its way across company networks in 2017.

A Cryptic Future

But there’s more than just burrowing baddies on deck for 2017. Ransomware was a $1 billion business in 2016, CSO Online noted, with more than 4,000 attacks reported every day. According to Information Management, security professionals should expect crypto-ransomware to hone in on specific industries as the price of stolen data falls.

With single records down to just $10 apiece, it’s no longer cost effective for attackers to infect and steal data. Instead, they’re better served by locking down patient information and then demanding payment for release. While the data isn’t up for sale to a third party, in the case of a health care organization, the inability to access vital information could lead to a stoppage of service or denial of care. This encourages victims to pay up or face losses of up to $1 million per day.

Worm Wars

Malware-makers are also changing their crypto-attack methods. As noted by IT Business Edge, attacks will “grow more intelligent by targeting high-value digital assets, including surveillance cameras, phone systems, security systems” and other business-critical devices. In addition, expect cybercriminals to set their sights on Internet of Things (IoT)-enabled devices to replace encryption with extortion by disabling physical systems.

Ransomware is still a hot property — many companies and individuals will pay up when critical data access is cut off — but criminals are looking for easier ways to big payouts. One option is evolving target selection, such as IoT devices and high-value communication assets, while threat developers are also looking to dig deep, burrow down and worm their way onto corporate networks.

More from

Hive0137 and AI-supplemented malware distribution

12 min read - IBM X-Force tracks dozens of threat actor groups. One group in particular, tracked by X-Force as Hive0137, has been a highly active malware distributor since at least October 2023. Nominated by X-Force as having the “Most Complex Infection Chain” in a campaign in 2023, Hive0137 campaigns deliver DarkGate, NetSupport, T34-Loader and Pikabot malware payloads, some of which are likely used for initial access in ransomware attacks. The crypters used in the infection chains also suggest a close relationship with former…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today