Advertisement
UK markets close in 7 hours 52 minutes
  • FTSE 100

    7,843.21
    -33.84 (-0.43%)
     
  • FTSE 250

    19,302.00
    -148.67 (-0.76%)
     
  • AIM

    741.64
    -3.65 (-0.49%)
     
  • GBP/EUR

    1.1675
    -0.0008 (-0.07%)
     
  • GBP/USD

    1.2441
    +0.0003 (+0.02%)
     
  • Bitcoin GBP

    51,908.91
    +2,762.91 (+5.62%)
     
  • CMC Crypto 200

    1,328.45
    +15.82 (+1.21%)
     
  • S&P 500

    5,011.12
    -11.09 (-0.22%)
     
  • DOW

    37,775.38
    +22.07 (+0.06%)
     
  • CRUDE OIL

    83.70
    +0.97 (+1.17%)
     
  • GOLD FUTURES

    2,401.80
    +3.80 (+0.16%)
     
  • NIKKEI 225

    37,068.35
    -1,011.35 (-2.66%)
     
  • HANG SENG

    16,248.05
    -137.82 (-0.84%)
     
  • DAX

    17,659.40
    -178.00 (-1.00%)
     
  • CAC 40

    7,970.68
    -52.58 (-0.66%)
     

Factbox - Five facts about ransomware attacks

FILE PHOTO: FILE PHOTO: Hooded an holds laptop computer as cyber code is projected on him in this illustration picture

(Reuters) - A ransomware attack on top U.S. fuel pipeline operator Colonial Pipeline has brought attention to the growing area of cybercrime.

The following are some details on ransomware and the issues around it:

What is ransomware?

- Ransom software works by encrypting victims' data; typically hackers will offer the victim a key in return for cryptocurrency payments that can run into the hundreds of thousands or even millions of dollars. If the victim resists, hackers are increasingly threatening to leak confidential data in a bid to pile on the pressure.

The ransomware group DarkSide suspected by U.S. authorities of the Colonial Pipeline attack, said in an unusual statement that it wanted to make money but did not say how much https://www.reuters.com/business/energy/statement-suspected-us-pipeline-hackers-say-they-dont-want-cause-problems-2021-05-10.

ADVERTISEMENT

How widespread is it?

- Ransomware gangs collected almost $350 million last year, up threefold from 2019, according to members of a public-private group called the Ransomware Task Force. While the magnitude of the DarkSide breach is significant, other kinds of attacks have arguably been more destructive. In 2017 the so-called WannaCry cyberattack crippled hospitals, banks and other companies across the globe. The U.S. government https://www.reuters.com/article/us-usa-cyber-northkorea/u-s-blames-north-korea-for-wannacry-cyber-attack-idUSKBN1ED00Q said the attack cost billions and blamed North Korea. NotPetya malware, which struck Ukraine the same year but also did damage worldwide, similarly racked up billions in costs.

What is being done to stop it?

- In April the U.S. Department of Justice established a government group on ransomware. Central bank regulators and financial crime investigators worldwide are also debating if and how cryptocurrencies, which are used to pay the ransoms, should be regulated.

What was the last major attack on U.S. infrastructure?

- In October 2020 Eastern European criminals targeted dozens of U.S. hospitals with ransomware, including in Oregon, California and New York. The FBI and Homeland Security officials subsequently led a conference for hospital administrators and cybersecurity experts.

What can be done to stop ransomware?

- Criminals using ransomware to extort money don't always use the most sophisticated methods. Biden administration official Anne Neuberger said, for example, that the DarkSide ransomware was a "known variant" and said some breaches can be thwarted by making sure computer networks have installed up-to- date patches.

(Compiled by Chris Sanders; editing by Grant McCool)