Incident: Title: SamSam Ransomware Paralyzes Computer Networks Across North America

Published Date: 2019-05-15

Postmortem Analysis
Timeline 1. The software failure incident involving the SamSam ransomware occurred between 2015 and 2018 as per the article [84557].
System 1. Ransomware strain known as SamSam [84557] 2. Bitcoin transactions and wallets [84557] 3. Data recovery firms Proven Data Recovery and MonsterCloud [84557] 4. Lack of effective law enforcement response to ransomware attacks [84557] 5. FBI's communication methods and understanding of ransomware [84557]
Responsible Organization 1. SamSam ransomware strain orchestrated by Iranian hackers [84557]
Impacted Organization 1. Cities of Atlanta and Newark [84557] 2. Port of San Diego [84557] 3. Hollywood Presbyterian medical center in Los Angeles [84557] 4. Colorado Department of Transportation [84557]
Software Causes 1. The software failure incident was caused by a strain of ransomware known as SamSam, which paralyzed computer networks across North America and the UK from 2015 to 2018, causing significant damages and disruptions [84557]. 2. The ransomware incident involved the encryption of files by cyber attackers, leading to the inability to access critical data unless a ransom was paid [84557]. 3. Proven Data Recovery and MonsterCloud, two firms involved in assisting ransomware victims, paid ransoms to hackers to obtain decryption tools, which was a key factor in the software failure incident [84557].
Non-software Causes 1. Lack of effective law enforcement response to ransomware attacks, leading to a proliferation of such attacks and a lack of deterrence [84557] 2. Insufficient resources and capabilities within local police departments to solve cybercrime, making them frequent targets of ransomware attacks [84557]
Impacts 1. The SamSam ransomware incident caused more than $30 million in damages to at least 200 entities, including cities like Atlanta and Newark, the port of San Diego, and the Hollywood Presbyterian medical center in Los Angeles [84557]. 2. The incident knocked out Atlanta’s water service requests and online billing systems, prompted the Colorado Department of Transportation to call in the national guard, and delayed medical appointments and treatments for patients nationwide whose electronic records couldn’t be retrieved [84557]. 3. The cyberattack impaired the ability of public agencies with missions involving saving lives to provide healthcare to sick and injured people, causing significant harm to innocent victims [84557]. 4. The incident led to the collection of at least $6 million in ransom by the cyberattackers [84557]. 5. The failure of law enforcement to catch or deter the hackers, and the moral quandary of whether paying ransoms encourages extortion, were highlighted as impacts of the incident [84557]. 6. Taxpayer money may have ended up in the hands of cybercriminals in countries hostile to the US, such as Russia and Iran, due to the incident [84557].
Preventions 1. Implementing robust cybersecurity measures such as regular software updates, strong password policies, network segmentation, and intrusion detection systems could have prevented the ransomware attack [84557]. 2. Conducting regular cybersecurity training for employees to recognize phishing emails and other social engineering tactics used by cybercriminals could have helped prevent the incident [84557]. 3. Developing a comprehensive incident response plan that includes regular backups of critical data and a clear protocol for responding to ransomware attacks could have mitigated the impact of the incident [84557]. 4. Collaborating with law enforcement agencies and cybersecurity experts to track and disrupt ransomware operations could have helped prevent future attacks and hold cybercriminals accountable [84557].
Fixes 1. Implementing robust cybersecurity measures to prevent ransomware attacks in the future, such as regular software updates, network segmentation, and employee training on cybersecurity best practices [84557]. 2. Strengthening law enforcement efforts to catch and deter cybercriminals involved in ransomware attacks, potentially through international cooperation and information sharing [84557]. 3. Encouraging transparency and ethical practices in data recovery firms by discouraging the payment of ransoms to hackers and promoting alternative methods of data retrieval [84557]. 4. Enforcing regulations or guidelines to prevent deceptive business practices in the data recovery industry, ensuring that clients are fully informed about the methods used to recover their data [84557]. 5. Enhancing public awareness about the risks of ransomware attacks and the importance of reporting incidents to law enforcement agencies to improve tracking and response to such cybercrimes [84557].
References 1. Former employee Jonathan Storfer [Article 84557] 2. FBI [Article 84557] 3. ProPublica [Article 84557] 4. MonsterCloud's chief executive, Zohar Pinhasi [Article 84557] 5. Trumann police department in Arkansas [Article 84557] 6. Leif Herrington, real estate brokerage owner in Anchorage, Alaska [Article 84557] 7. FBI affidavit [Article 84557]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident having happened again at one_organization: - Proven Data Recovery was involved in paying ransoms to cyberattackers, such as the SamSam hackers, to unlock data for their clients [84557]. - Proven Data Recovery paid a ransom to unlock files for a real estate brokerage in Anchorage, Alaska, affected by the DMA Locker ransomware [84557]. - Proven Data Recovery continued to pay the SamSam hackers even after one of their employees, Jonathan Storfer, left the company [84557]. (b) The software failure incident having happened again at multiple_organization: - Another US company, MonsterCloud, was also mentioned in the article for paying ransoms to cyberattackers without informing victims, such as local law enforcement agencies [84557]. - MonsterCloud was praised by four local law enforcement agencies for restoring their data following ransomware attacks [84557]. - Both Proven Data Recovery and MonsterCloud were highlighted as firms in the US that dominate the industry of unlocking victims' computers affected by ransomware attacks [84557].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase: - The incident of the SamSam ransomware attack paralyzed computer networks across North America and the UK from 2015 to 2018, causing significant damages to various entities [84557]. - The strain of ransomware known as SamSam was developed by two Iranian men who orchestrated the extortion, targeting public agencies with missions involving saving lives and impairing their ability to provide healthcare to sick and injured people [84557]. - Proven Data Recovery and MonsterCloud, two US companies, paid ransoms to cyberattackers to obtain decryption tools, instead of using their own data recovery methods as they claimed [84557]. - Proven Data Recovery and MonsterCloud charged victims substantial fees on top of the ransom amounts, offering services to unlock data but actually paying ransoms to hackers [84557]. (b) The software failure incident related to the operation phase: - Proven Data Recovery and MonsterCloud paid ransoms to cyberattackers to unlock data for victims, indicating a failure in the operation of their data recovery services [84557]. - Victims of ransomware attacks, including law enforcement agencies, turned to companies like MonsterCloud for help in restoring their data following attacks, showing a reliance on external services due to the failure to protect against ransomware [84557]. - The FBI noted that ransomware attacks are a top cybercriminal threat, with victims often not reporting incidents due to embarrassment or reluctance to acknowledge gaps in their IT security, highlighting operational failures in cybersecurity measures [84557]. - The lack of effective law enforcement response to ransomware attacks led to the emergence of companies like Proven Data and MonsterCloud, indicating a failure in the operational aspect of combating cybercrime [84557].
Boundary (Internal/External) within_system, outside_system (a) within_system: - The software failure incident involving the SamSam ransomware strain was primarily caused by factors originating from within the system itself. The ransomware paralyzed computer networks across North America and the UK, causing significant damages to various entities [84557]. - Proven Data Recovery and MonsterCloud, two companies involved in assisting ransomware victims, paid ransoms to hackers to unlock data, which was a contributing factor within the system leading to the failure incident [84557]. - Proven Data Recovery obtained decryption tools from cyberattackers by paying ransoms, indicating an internal factor contributing to the failure incident [84557]. - The companies involved in paying ransoms to hackers developed relationships with the attackers, negotiated payment deadlines, and facilitated ransom payments, all of which were internal factors within the system leading to the failure incident [84557]. - Proven Data Recovery paid ransoms to hackers at the direction of their clients, including hospitals, which further highlights the internal factors contributing to the failure incident [84557]. (b) outside_system: - The failure incident was also influenced by factors originating from outside the system. The SamSam ransomware strain was developed and orchestrated by two Iranian men, indicating an external factor contributing to the failure incident [84557]. - The ransom demands and payments were made using bitcoin, which is intended to be anonymous and difficult to track, showcasing an external factor outside the system that influenced the failure incident [84557]. - The US Department of Justice indicted the Iranian men responsible for the ransomware strain, highlighting external factors that played a role in the failure incident [84557]. - The US treasury department banned payments to digital currency destinations linked to the attackers, citing sanctions targeting the Iranian regime, which was an external factor influencing the failure incident [84557].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident occurring due to non-human actions: - The software failure incident in the article is primarily attributed to the strain of ransomware known as SamSam, which paralyzed computer networks across North America and the UK from 2015 to 2018 [84557]. - SamSam ransomware caused significant damages to various entities, including cities, medical centers, and government agencies, by encrypting files and demanding ransom for decryption keys [84557]. - The ransomware attack disrupted services, delayed medical treatments, and caused financial losses, showcasing how non-human actions (the ransomware) led to the software failure incident [84557]. (b) The software failure incident occurring due to human actions: - Human actions also played a role in the software failure incident, as some companies like Proven Data Recovery and MonsterCloud paid ransoms to the hackers to unlock encrypted data for their clients [84557]. - These companies facilitated ransom payments to cyberattackers, sometimes without informing victims, and developed relationships with hackers to negotiate payment extensions, indicating human involvement in the incident [84557]. - The actions of these companies, including paying ransoms and interacting with cybercriminals, contributed to the resolution of the software failure incident caused by the ransomware attack [84557].
Dimension (Hardware/Software) software (a) The articles do not provide information about a software failure incident occurring due to contributing factors originating in hardware. (b) The software failure incident reported in the articles is related to ransomware known as SamSam, which paralyzed computer networks across North America and the UK from 2015 to 2018. This strain of ransomware caused significant damages to various entities, including cities, medical centers, and government agencies. The incident involved the encryption of files by cyber attackers, leading to disruptions in services, delays in medical treatments, and financial losses [84557].
Objective (Malicious/Non-malicious) malicious, non-malicious (a) The objective of the software failure incident was malicious, as it was caused by a strain of ransomware known as SamSam that paralyzed computer networks across North America and the UK from 2015 to 2018. The attackers behind SamSam targeted public agencies and organizations involved in saving lives, impairing their ability to provide healthcare to sick and injured people. The cyberattackers collected at least $6m in ransom in return for restoring access to the files, and they knew that shutting down computer systems could cause significant harm to innocent victims [84557]. (b) In contrast, the software failure incident was non-malicious in the sense that some companies, like Proven Data Recovery and MonsterCloud, claimed to assist ransomware victims by unlocking their data with their own technology. However, it was revealed that these companies actually paid ransoms to hackers to retrieve the data, sometimes without informing the victims. This non-malicious aspect involved companies misleading clients about their methods and not being transparent about paying ransoms to hackers [84557].
Intent (Poor/Accidental Decisions) poor_decisions, accidental_decisions The intent of the software failure incident related to the SamSam ransomware attack can be categorized as both poor_decisions and accidental_decisions: (a) poor_decisions: The incident involved poor decisions made by companies like Proven Data Recovery and MonsterCloud, who paid ransoms to hackers to unlock data for their clients. Proven Data Recovery, for example, paid ransoms to the SamSam hackers, which raised ethical concerns about potentially funding terrorism and organized crime [84557]. (b) accidental_decisions: The incident also involved accidental decisions or unintended consequences, where companies like Proven Data Recovery and MonsterCloud may have misled clients about their methods of data recovery or failed to disclose that they were paying ransoms to hackers. This lack of transparency led to misunderstandings and potential ethical dilemmas for the clients [84557].
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident related to development incompetence can be seen in the case of the SamSam ransomware attack mentioned in Article 84557. The incident involved Iranian hackers developing the strain of ransomware known as SamSam and orchestrating the extortion, causing significant harm to innocent victims, including public agencies with missions involving saving lives. The attackers impaired the ability of these agencies to provide healthcare to sick and injured people, showcasing the consequences of the ransomware attack [84557]. (b) The accidental aspect of the software failure incident can be observed in the case of Proven Data Recovery and MonsterCloud, where these companies paid ransoms to hackers to unlock data for their clients. In some instances, the companies may have paid the ransom without informing the victims, leading to potential misunderstandings and ethical dilemmas. For example, Proven Data Recovery paid a ransom to unlock files for a real estate brokerage in Anchorage, Alaska, without explicitly mentioning the payment to the victim, raising concerns about potential deception and lack of transparency in the process [84557].
Duration temporary The software failure incident described in the articles can be categorized as a temporary failure. This is evident from the fact that the incident involved ransomware attacks by the SamSam strain, which paralyzed computer networks across North America and the UK from 2015 to 2018 [84557]. The incident caused significant damages to various entities, including cities, medical centers, and government agencies. The attackers demanded ransom payments in exchange for restoring access to the files, and companies like Proven Data Recovery and MonsterCloud facilitated these payments to the hackers to help victims regain access to their data [84557]. Additionally, the articles highlight that the ransomware attacks were ongoing and involved negotiations with the hackers to lower ransom amounts for clients. Proven Data Recovery, for example, had a list of hackers who could provide decryption keys quickly and at reduced rates, indicating a temporary nature of the failure incident where negotiations and payments were made to address the immediate impact of the ransomware attacks [84557].
Behaviour omission, other (a) crash: The incident described in the articles does not specifically mention a system crash where the system loses state and fails to perform its intended functions. (b) omission: The incident involves failures where the system omits to perform its intended functions at instances. For example, the ransomware attacks caused delays in medical appointments and treatments for patients nationwide whose electronic records couldn't be retrieved [84557]. (c) timing: The incident does not directly relate to failures caused by the system performing its intended functions too late or too early. (d) value: The incident does not directly relate to failures caused by the system performing its intended functions incorrectly. (e) byzantine: The incident does not directly relate to failures caused by the system behaving erroneously with inconsistent responses and interactions. (f) other: The behavior of the software failure incident described in the articles can be categorized as a ransomware attack that paralyzed computer networks, encrypted files, and demanded ransom payments for restoring access to the files. This behavior falls under the category of a cyberattack involving extortion and data encryption [84557].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property, delay (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident involving the SamSam ransomware strain caused significant financial damages, with more than $30 million in damages reported across various entities, including cities, medical centers, and government agencies [84557]. The ransomware attack disrupted computer networks, paralyzed services, delayed medical appointments, and affected the ability to access electronic records, leading to financial losses for the affected organizations. Additionally, ransom payments totaling at least $6 million were made to the cyberattackers in exchange for restoring access to files [84557].
Domain information, health, government (a) The failed system was intended to support the information industry. The ransomware incident affected various entities, including public agencies, hospitals, and businesses, disrupting their ability to access electronic records and provide services [84557].

Sources

Back to List