#NotPetya can’t wipe what isn’t there

By Joel Wallenstrom, Wickr CEO

Read on TechCrunch

Another round of viral attacks apparently masquerading as ransomware is bringing operations across industries to a halt. This time the target is anyone doing business in Ukraine — not many seem immune including a multinational shipping corporation and even Chernobyl of all places. Following WannaCry and what appears to be the wiper mimicking the 2016 ransomware Petya, three things have become reliably predictable:

1. In conversations with enterprises large and small, I get asked how to stop a ransomware or malware attack 42 times a day;

2. No matter how many layers of defense you’ve deployed and how responsible users at your company are, you may still get hit;

3. Everyone now offers an infallible product to protect all the things against everything. The problem is gone for as low as free, averaging somewhere around $20. So that’s easy: click, sign up, done.

Oh wait… After getting a new anti-virus and upon further reading, you now must ensure that:

· All your employees do regular back ups;

· All your employees disable macros;

· All your employees religiously update their devices to ensure their OS, AV, Flash, Java and browsers are solid;

· All your employees enable ‘show file extensions’ (assuming you have figured out how to make sure your team understands the meaning of ‘file extension’);

· We all click on and open the right things only;

· All corporate systems are patched… (I mean remain patched just as they have always been, right?);

· Train — retrain — train — retrain — train;

· Use strong passwords that can’t be brute-forced;

· Block Tor.

There are also suggestions that we could use artificial intelligence at extended end points that (of course) cannot be beaten because there is no reliance on heuristics or signatures, which is to say it’s not just antivirus anymore.

As always, the response to a security event of a global magnitude is stamping “anti the thing in the news” on a product and chasing flashing lights. We are now 17 years removed from I LOVE YOU worm luring unassuming users with promises of Anna Kournikova’s photos, and yet we have another piece of malware knocking inoperable nuclear power plants, multinational oil and shipping companies.

While not a new challenge, one would think the sheer scale of these attacks should inspire behavior change and generate more new solutions. Yet, we get the same recipe as we’ve heard over the past 20 years — deploy tools in the network to catch suspicious events, train your employees, back up your data, segment your networks and use the best anti-virus.

So first of all, anti-virus is dead.

Okay, dying. Every week my team talks to companies who have liberated themselves from this shell game. However scary that may be, it is bad tech that only feeds the underlying problem.

Deploying network security tools.

Yes, you probably have to do some of this while keeping in mind that these are merely speed bumps that do have certain value. What’s important is to stay nimble and ready to switch providers on the fly understanding that you can/should only jam so much on your endpoints.

Training your team to only open and click on the things that are not harmful.

Take it from someone with twenty years of information security experience — not practical advice. Flip that script and operate knowing that your employees will and should click on and open things that are bad. Why? Because the current state of phishing is juvenile and, inevitably, the sophistication of attacks will increase in direct proportion to the efficacy of any training program. Build processes that enable your team to do their work and make mistakes.

Backing up data is not a new thing nor is the challenge of protecting these back-ups.

It used to be that storage was so deep in the network onion that most organizations treated storage security like hardware security — if someone has access to my storage array, they already have access to everything. But things have changed with cloud backups, which is why more thought needs to be given to what actually is worth storing and protecting. With almost 70% of stored corporate data having no or negligible business or regulatory value, attempting to protect these massive of data makes no practical or security sense.

Of course, the big data economy encourages companies — big and small — to save and protect everything even though the math tells a different story. Perhaps the real important debate is whether liability will transfer to a cloud provider who encourages its customers to store and make available for search all of their communications and knowledge.

When in response to a malware attack global enterprises with great resources end up shutting down their systems, including critical communications, and move to employees’ personal devices for texts and emails, it is time to rethink the game of storing everything, which is making us more vulnerable and exposed.

Anyone knows that you cannot lose what you don’t have. By the same token, if you are in control of your data that is not stored server-side and expires when it’s no longer needed, a task of protecting less information that does need to be recorded becomes increasingly more manageable. When you build reliably ephemeral operations that are not dependent upon the hope that storing everything may someday prove useful, the notice that “the files expiring in a week are encrypted and will be deleted unless…” just doesn’t have the same teeth.

The bottom line is that the recent wave of viral malware attacks is nothing than more of the same. Email is vulnerable, network security is difficult, anti-virus is nowhere near being effective and everyone has a best product that will fix all of the things on the network or your endpoints. There will almost certainly be the next ‘NotPetya’, probably sooner than we expect. Why not flip the equation?

Getty Image

Use math to your advantage. Encrypt your communications and data proactively. Deploy tools to verify participants in critical communications. Perhaps most importantly, understand that just because recorded communications have been the norm in the past 10 years, it doesn’t mean that we have to work in the paradigm that is no longer justified by current security environment. Ephemeral communication tools (like Wickr) provide you the opportunity to rely on math to take control over your communications, how long it lives and how long it is accessible to intended recipients only. So you no longer have to protect all the things. Your move now.




Insights + ideas from Wickr’s crypto & security teams

Recommended from Medium

Virtual Smart Cards and password hashes in Active Directory 2016 Environments

{UPDATE} Piano Miraculous Ladybug Hack Free Resources Generator

{UPDATE} Devarai Crosswords Hack Free Resources Generator

RSA Archer XSS in File upload feature — Disowned by DELL

{UPDATE} Quiz Your Mythology Hack Free Resources Generator

Top 7 Tips How to Protect Yourself from Phishing Scams

Secure digest functions

Recon in Cybersecurity is Out!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Secure Ephemeral Communications. Built for the enterprise. End-to-end encrypted messaging. Secure rooms. Peer-to-peer encrypted file sharing. Multi-platform.

More from Medium

A Denuded Earth — An interview with Evan Hancock

W Fall Track, Victoria 2018 — Fine Art Photography by Evan Hancock — Available for purchase online at www.fmplus1.com/shop-fm1

Abandoned Chinese City of Ordos in Inner Mongolia has been called the world’s largest ghost town.

Election wishes - Part 3

What’s all the fuss about Ukraine?