Military & Aerospace

Don’t Cry beyond WannaCry
VN:F [1.9.16_1159]
2 votes cast
Don’t Cry beyond WannaCry, 5.0 out of 5 based on 2 ratings
Issue Net Edition | Date : 03 Jun , 2017

WannaCry or WannaCry 2.0 the ransomware that struck globally some 150 countries last month affected some 200,000 PCs worldwide. India was the third hardest hit county with close to 50,000 PCs affected. Ransomware attacks are not new but this time the scale was massive.

Russia accused the US for the WannaCry / WannaCry 2.0 offensive while Neel Mehta, Indian-origin security researcher with Google, found evidence suggesting that North Korean hackers may have carried out the unprecedented ransomware cyberattack

The number of internet users worldwide are estimated around 3.2 billion and their number in India is set to exceed 450 million by end June 2017. So it is natural that ransomware attacks will increase in future, Not that cyber attacks and ransomware are new phenomenon. 1982 was the first major cyber attack causing the Siberian pipeline explosion.

Gary Mckinnon, British national breached numerous US government networks for 13 months in 2001-2002 including NSA and pentagon disrupting sensitive communications and causing damage worth hundreds of thousands of dollars. In October 2016, details of over 30 lakh debit cards from leading Indian banks were compromised and leaked from ATMs due to cyber attacks. In December 2016, websites and data bases of seven Indian missions in Africa and Europe were hacked and data reportedly put on line. In January this year, ‘legion’ claimed hacking twitter accounts of Rahul Gandhi and vijay mallya, also claiming Indian banking system and Paytm can be easily hacked.

As for WannaCry, more than 45,000 attacks were recorded in countries including UK, Russia, India, China, Ukraine, Italy, Egypt and Spain. The malware was put online on April 14 by a group called ‘Shadow Brokers’ who last year had claimed to have stolen a cache of “cyber weapons” from the US National Security Agency (NSA).

Interestingly, Russia accused the US for the WannaCry / WannaCry 2.0 offensive while Neel Mehta, Indian-origin security researcher with Google, found evidence suggesting that North Korean hackers may have carried out the unprecedented ransomware cyberattack; some of the code used in WannaCry software being nearly identical to the code used by North Korean hackers called ‘Lazarus Group’ that had hacked Sony Pictures Entertainment in 2014 and Bangladesh Central Bank in 2016. Advances in cyberwarfare may be gauged from the fact that according to a recent WikiLeaks report, 85% of global smart-phones have been weaponized by the CIA by using the Android operating system (OS) for spying and that a surveillance technique called ‘Weeping Angel’ infiltrates smart TVs, transforming them into microphones.

The fact that ‘WannaCry Ransomware’ has infected more than 45,000 computers in India should make the government take serious note. Such vulnerabilities will grow exponentially with Digital India…

Ransomware is a type of malware that encrypts a user’s data, then demands payment in exchange for unlocking the data. This attack used malicious software WannaCry or WannaCry 2.0 to exploit vulnerability in Windows. Microsoft had released a patch (a software update that fixes the problem) for the flaw in March, but computers that have not installed the security update remain vulnerable. The ransomware demands users pay $300 worth of cryptocurrency Bitcoin to retrieve their files, though it warns that the “payment will be raised” after a certain amount of time. Translations of the ransom message in 28 languages are included. The malware spreads through email.

Pune-based company Quick Heal Technologies detected over 48,000 MS-17- 010 Shadow Broker hits by  WannaCry ransomware outbreak in India (West Bengal ranking at the top with most affected computers that fell prey); about 60% of the WannaCry ransomware infiltration attempts were targeted at enterprise systems, while the rest 40% were directed towards individual customers of the security vendor. It is sheer luck that despite antiquated systems, damage was not much, however absence of major hit does not mean that all the systems are safe from future attacks.

Ransomware attacks worldwide rose 167 times in 2016 compared to 2015. WannaCry or WannaCry 2.0 attacks are not the first of this type. Earlier, Britain’s healthcare system, National Health Service (NHS), was infected by a ransomware called ‘Wanna Decryptor’, which prevented patients from making any appointment while demanding ransom to grant access to the system.

As per FBI estimates, cyber criminals pocketed $1 billion in USA alone through Ransomware during 2016. A Los Angeles hospital reportedly paid $17,000 to ransomware hackers last year, after a cyber-attack locked doctors and nurses out of their computer system for days.

Curbing ego, UIADI needs to learn from the Zomato experience, especially with  the May 1, 2017 report by CIS stating that some 13 crore Aadhaar numbers and 10 crore bank account numbers were easily accessible on four government portals connected to welfare schemes.

At home, the Ganga Ram Hospital suffered similar breach in March 2016 with three systems infected with malware called Cryptowall that encrypted all data and asked for two bitcoins (worth around $825 at the time) to decrypt it and unlock the systems. The system got infected after an employee downloaded a zipped file with the malware from personal email. Two other machines connected to the system also affected. Later, the hospital upgraded its system to Windows 10 that saved it when the WannaCry cyber offensive came.

The fact that ‘WannaCry Ransomware’ has infected more than 45,000 computers in India should make the government take serious note. Such vulnerabilities will grow exponentially with Digital India where expanding connectivity is taking precedence over cyber security, costs for the latter being a major factor. Security measures must be incorporated during the designing phase of every  computing system.  There is urgent need for: evaluating the security of computing systems and analyzing the vulnerabilities; developing cross-domain security policies to prevent the spread of malware and subvert the hackers; and, examining possible vulnerabilities that rise from integrating legacy systems with state-of-the-art systems may lead to vulnerabilities.

In order to protect the national critical infrastructure in India, as mandated in section 70A amended IT Act 2000, a National Critical Information Infrastructure Protection Centre (NCIIPC) has been set up, and a National Cyber Security Policy was rolled out in 2013. However, we need to get the national infrastructure risk assessed in time-bound schedule for developing a clear policy of public-private partnership in combating such crimes. Additionally, the government should consider establishing a National IT Product Security Test Centre (NIPSTC), which should operate and maintain a National Evaluation and Certification Scheme for IT Security.

Recently, some 17 million user records were stolen from the online restaurant search platform ‘Zomato’. According to information security blog and news website HackReed, the data was being peddled online on the “dark web” for about $1,000. Late Zomato claimed that it had managed to contact the hacker, who agreed to not only destroy all copies of the data, but also to take the database off the dark web marketplace.

It would be prudent to switch from ‘Digital India’ to ‘Secure Digital India’ and execute the latter with all thoroughness.

Curbing ego, Unique Identification Authority of India (UIADI)  needs to learn from the Zomato experience, especially with  the May 1, 2017 report by Centre for Internet & Society (CIS) stating that some 13 crore Aadhaar numbers and 10 crore bank account numbers were easily accessible on four government portals connected to welfare schemes. The report pointed out that, though the Aadhaar Act makes it illegal to publish a citizen’s Aadhaar number, government websites were making it easy for just about anyone to access a vast number of these numbers as well as other data such as bank account numbers. It added that this sort of information could be used for financial fraud and profiling, among other things.

The need of the hour is: one, to develop a multi-level approach to security that can protect systems at different layers; two, ensure prevention, detection and recovery of systems from attacks for digital security; three,  develop mechanisms for software authenticity and integrity; four, pan-India initiatives for cyber literacy, safety and law enforcement policies to educate and integrate the common man.

Prime Minister Narendra Modi had changed the slogan from ‘Look East’ to ‘Act East’. It would be prudent to switch from ‘Digital India’ to ‘Secure Digital India’ and execute the latter with all thoroughness.

Rate this Article
Collapse
VN:F [1.9.16_1159]
2 votes cast
Don’t Cry beyond WannaCry, 5.0 out of 5 based on 2 ratings
The views expressed are of the author and do not necessarily represent the opinions or policies of the Indian Defence Review.

About the Author

Lt Gen Prakash Katoch

is a former Lt Gen Special Forces, Indian Army

More by the same author

Post your Comment

*

2000characters left