I just read that "ransom" attacks are on the rise - where the attacker uses a vulnerability to enable them to encrypt files and demand money for the key.
Why is this any different to a disk failure, where the solution is "get the backup"?
I just read that "ransom" attacks are on the rise - where the attacker uses a vulnerability to enable them to encrypt files and demand money for the key.
Why is this any different to a disk failure, where the solution is "get the backup"?
Most people don't have backups. Most people who do have backups, haven't tested them to make sure they work.
The real difference between disk failure and ransomware is that paying the ransom is cheaper than paying a data-recovery company, and is more likely to get your data back.
A few people are mentioning back-ups as a fix for ransomware. Ransomware works because the target is not prepared for the outcome. While a failed hard drive and a ransomware encryption can both be "recovered" via restoring a backup to a new drive, the ransomware is sometimes a malware that runs on the machine itself. In any event, restoring from an external backup will not remove the issue that allowed the attackers access to the system in the first place. This requires countermeasures such as:
Unfortunately most computer users do not have these countermeasures in place.
To recover from a failed drive, simply make backups to an external disk. Upon drive failure replace the disk and restore the volumes. Simple.
To recover from a ransomware requires time, downtime, and investigation to determine if the machine was compromised due to:
If the cost of an investigation is expensive, it may be cheaper to pay the ransom.
Note: the system/network still needs to be secured prior to and after an investigation, otherwise the same attack can recur.
In some cases, by enabling encryption on a volume with BitLocker where the volume was not already encrypted, the attacker can prevent access to the entire volume locking the user out of their own system. In this case it's a Windows feature. There would be no evidence of anything "installed" on the system, but rather there would be evidence of an intrusion if the system was configured in such a way that the user's account could be compromised either remotely or in-person with the insertion of an infected device.
On Disk Failure
When a disk fails you simply replace the device because it was a physical failure. If several disks are failing, then there is an issue with the controller. You can only tell if a disk has failed by testing it in a different machine if a new disk exhibits the same symptoms, or if you test a new disk in the failed machine and it works, then you know the controller is okay. In situations like a RAID where multiple disks work together, a failed disk can take out other disks, so there is a chance for systemic failure across multiple devices. Think about bad sectors and file corruption on a single drive being mirrored to multiple copies on a RAID. Disk failure is typically only limited to one machine, with the exception of networks where terminals (thin clients) all connect to a central system. Replacing a failed disk usually remedies the issue. Statistically you're not likely to experience the same issue unless the replacement disk was purchased at the same time and was part of the same vendor run in which case it might be a manufacturer defect of a component line.
It's not always only one machine with Ransomware though
Some ransomware can actually encrypt more than one machine on a network. I have a client whose server was infected, and allowed the virus to spread to multiple machines on the network and then the server and workstations were all locked. In cases where the server might not be infected, but is acting as a host, this can cause recurring infections to workstations that connect to the infected files. Regardless, the issue needs to be fixed systemically to stop the infection.
If a hard drive in a workstation dies it doesn't replicate the failure across a network. Comparing ransomware and hard drive failures is like comparing cancer to a broken limb; they are both debilitating.
Overall, hard drive failure has potential to not be as damaging with precautions and recovery services, whereas ransomware is designed to be intentionally much more damaging.
For backups to be useful you have to do them regularily. If you work on your computer and your last backup was one week ago, those files created in one week may already be worth 50-100$/€ whatever the attacker demands. And if not-backed- up photos are involved, most are even more willing to pay. This makes this kind of attack quite profitable.
Most people have no clue about computers. They are just plain simple users, with little knowledge of what to avoid or what could go wrong. After all, in most cases when you have a virus or a rootkit, you will know someone who can help you out, save your files, format your computer and reinstall Windows for you. That means for those users the attack comes out of nowhere and they are just unprepared.
And people are also lazy. Even if they knew that backups are useful, most would be too lazy to connect their computer to an external drive periodically. And most wouldn't really know how to do it, besides pulling all files they like manually onto the drive. In which case they could easily miss some or copy so many files that the process gets tedious over time.
Also if your backups are connected to your network/computer they may simply be vulnerable as well, because you are expecting a disk failure, but you think that your network/computer generally is safe from most exploits or users were told what to avoid.
With ransomware, there is a strong psychological element - a feeling of violation.
If your hard drive dies and you have no backup, well that it something that just happened, like an earthquake.
Ransomware is like someone broke into your house, someone actually did something to you. In addition, a hard drive dies and you have no backup, you're done. If it's ransomeware, now the user needs to decide: Do I pay? If I pay, will they actually give me my data?
If a hard drive dies, what's the likelihood of another drive failing? If someone was stupid enough to download the ransomware, they may not know what they did and will be scared that it will happen again. In many cases, the user probably downloaded something, but many users will think they were "hacked" and were targets.
By successful you mean, why do people pay instead of using backups? Some possibilities:
They have something like Carbonite or Mozy as their backups, have their password in a .txt
file and will never be able to retrieve the password since they are locked out of their computer
Someone else set up their backups and they don't know how to do it, and don't want to admit they downloaded something and got attacked to the their IT friend
A dead hard drive is a failure, ransomware is an attack. They both result in loss of data availability if no action is taken, however, the ransomware also implies other attacks or violations may be possible - why shouldn't the attacker unlock your data and then relock it again and again or also add you to a botnet? The ransomware may not be a one and done ordeal.
If backups are being performed, and those backups are not accessible by the ransomware, then just getting the backup should be enough (after of course fully removing the ransomware software from the infected computer).
If the backup medium is always connected (eg. mounted network share, USB hard drive, etc), it is possible that the ransomware encrypts the backups also.
"Why is this any different to a disk failure"
One point hasn't been brought up yet: It's not really different at all. The people who pay for encryption type ransomware would also pay $500 to have their harddrive instantly restored after a disk failure.*
Backups are very uncommon on average people's home PCs. Buying a NAS and learning about networks and how to do automated backups is neither cheap nor simple for an average computer user. Buying an external HDD and connecting it occasionally is cheap and simple, but too cumbersome so the last backup will be a couple months old. And it doesn't help that if you use Windows, the built-in way to do backups changes every 3 years. The backups also have the issue that they are on publicly accessible network shares, meaning the ransomware could decide to encrypt them too.
Also, let's not forget about installing Windows from scratch, without having a disc. I'd guess less than 25% of users are comfortable doing that - even if there's a backup, they would have to go to a repair shop to fix the PC, reinstall Windows, and install the backup. The repair shop costs money as well and means the PC won't be available for a week.
*A special case are people who are ashamed to have caught a virus while doing I don't know what, who want the problem to go away without anyone else noticing. They will pay the ransom to avoid humiliation.
The other answers all raise excellent points about the availability of backups and the viability of ransomware as a method of attack. However I don't feel that any have particularly compared the specific case of ransomware vs. disk failure from the attacker's perspective.
Were I to attack somebody's computer system and I had the choice of those two results with roughly equal probability of success then it seems plenty obvious to choose the one which potentially provides me a monetary profit should it succeed.
I once was victim of an attack that didn't allow me to boot the computer without seeing a screen that stated something in the tone of:
The police has detected this computer doing all kind of bad stuff and a fine needs to be paid to resolve the charges.
If this happens on a computer that is shared with those who do not know about ransomware this could be much more harmfull than a 'normal' system wipe. And thus an attack may be more likely to yield something.
In addition to the other answers, I'd like to point out that some ransomware doesn't advertise itself as such.
Instead, it disguises itself as a component that alerts the user that it has detected some corrupted files on the machine. It then "proceeds to find a solution online", like the legitimate OS does, and brings the user to a webpage where he can buy "a software to fix his computer". Of course, the "corrupted" files were encrypted by the ransomware in the first place, and the software the user buys at a dear price decrypts the files.
The beauty of this safer, low-profile approach is that often the user doesn't even realize he has been scammed. This contributes to increase the numbers for successful ransomware attempts.
(Unfortunately I can't find the references anymore for this kind of malware; I'll add examples should I find them.)
Ransomware attacks are successful because users do not always save copies of their sensitive data other than on their computers and lot of people accept to pay to get back their compromised data.
As long as there are users who pay, ransomware attacks won't stop but only will evolve and improve.