Incident: RansomWeb Attacks: Web Encryption Key Hijacking and Ransom Demands

Published Date: 2015-02-03

Postmortem Analysis
Timeline 1. The software failure incident of RansomWeb attacks mentioned in the article happened in December [33507]. The incident occurred in December, as stated in the article.
System The system that failed in the software failure incident described in the article is: 1. Website encryption system used for securing or backing up data [33507]
Responsible Organization 1. Hackers behind the RansomWeb attacks were responsible for causing the software failure incident [33507].
Impacted Organization 1. Websites and web applications were impacted by the RansomWeb attacks, causing them to become inoperable and inaccessible [33507].
Software Causes 1. The software cause of the failure incident was ransomware attacks targeting websites, specifically the new type of attack called "RansomWeb" where hackers break into a website, take control of the encryption system, change the keys, and render the website or web app inoperable [33507].
Non-software Causes 1. Lack of adequate cybersecurity measures to prevent unauthorized access to the website's encryption system [33507] 2. Negligence of website administrators in maintaining the security of web applications and critical data [33507]
Impacts 1. The software failure incident resulted in websites being rendered inoperable by changing encryption keys, causing them to lose access to essential information or code [33507]. 2. A company was reportedly held to ransom after a critical web app was taken offline through the attack, leading to a disruption in services and a demand for ransom to decrypt crucial data and restore service [33507].
Preventions 1. Constant monitoring for file changes within the web app code and databases could have helped detect the ransomware attack before it caused significant damage [33507].
Fixes 1. Constant monitoring for file changes within the web app code and databases could help detect attempts of RansomWeb attacks [33507]. 2. Implementing robust security measures to prevent unauthorized access to encryption keys and critical data stored on servers [33507]. 3. Regularly updating and patching web applications to address vulnerabilities that could be exploited by hackers [33507].
References 1. Security company High-Tech Bridge [33507]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident related to ransomware attacks has happened again at one_organization. In December, a company was reportedly held to ransom after a critical web app was taken offline through the attack. The hackers had broken into the servers that ran the web app six months prior, but waited until some critical data had been encrypted and the security key stored on a protected remote server. They then removed the key from the web server, breaking the app, and sending a ransom demand to the company to decrypt the crucial data and restore service [33507]. (b) The software failure incident related to ransomware attacks has also happened at multiple_organizations. The move from ransomware to ransom attacks on the web is not unexpected by security analysts, who believed it was only a matter of time as more and more crucial corporate data is stored off site in the cloud. This indicates that similar incidents may have occurred at other organizations or with their products and services [33507].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the article. The ransomware attacks, known as "RansomWeb," involve hackers breaking into websites, taking control of the encryption system used for securing data, and changing the keys, rendering the website or web app inoperable [33507]. This failure can be attributed to the design of the encryption system and the vulnerability in the web applications that allow hackers to manipulate the keys and disrupt the functioning of the websites. (b) The software failure incident related to the operation phase is also highlighted in the article. Hackers were able to hold a company to ransom after taking a critical web app offline through the attack. The attackers had broken into the servers running the web app and encrypted critical data, making it impossible for the company to access the information without the security key stored on a remote server [33507]. This failure can be linked to the operation and management of the web servers and the handling of critical data, leading to the disruption of services and the demand for ransom to restore access.
Boundary (Internal/External) within_system (a) within_system: The software failure incident described in the article is related to ransomware attacks on websites, where hackers break into a website, take control of the encryption system within the site, change the encryption keys, and render the website or web app inoperable [33507]. This failure originates from within the system itself, as the attackers manipulate the internal encryption keys and systems of the targeted websites to cause the failure.
Nature (Human/Non-human) human_actions (a) The software failure incident in the article is related to human_actions. The incident involves hackers breaking into websites, taking control of encryption systems, changing encryption keys, and demanding ransom to restore access. This malicious activity is driven by financial profit motives, indicating human involvement in orchestrating the ransomware attacks [33507].
Dimension (Hardware/Software) software (a) The software failure incident related to hardware: - The article does not specifically mention any software failure incident related to hardware contributing factors originating in hardware. (b) The software failure incident related to software: - The article discusses a software failure incident related to ransomware attacks on websites, where hackers break into a website, take control of the encryption system, change the keys, and render the website or web app inoperable by stopping it from accessing essential information or code [33507]. - The incident involves a critical web app being taken offline after hackers broke into the servers and encrypted critical data, leading to a ransom demand to decrypt the data and restore service [33507]. - The article highlights the difficulty in preventing such attacks due to the complexity of web apps and the need for constant monitoring for file changes within the web app code and databases to detect such attempts [33507].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the articles is malicious in nature. It involves ransomware attacks on websites, where hackers break into a website, take control of the encryption system, change the keys, and demand ransom to restore access to the data and services [33507]. The attackers are compared to burglars who change all the locks of a house, making it impossible for the owner to regain access. The incident is characterized by web blackmailing, ransom demands, and exploiting negligent website administrators for financial profit. The attackers deliberately encrypt critical data, remove security keys, and demand ransom to decrypt the data and restore service, indicating malicious intent to harm the system and extort money from the victims.
Intent (Poor/Accidental Decisions) poor_decisions (a) The intent of the software failure incident was related to poor_decisions. The article mentions that a company was reportedly held to ransom after a critical web app was taken offline through the attack. The hackers had broken into the servers that ran the web app six months prior, but waited until some critical data had been encrypted and the security key stored on a protected remote server. They then removed the key from the web server, breaking the app, and sending a ransom demand to the company to decrypt the crucial data and restore service. This indicates that the attackers made strategic decisions over time to carry out the ransomware attack [33507]. (b) The intent of the software failure incident was also related to accidental_decisions. The article highlights that the move from ransomware to ransom attacks on the web was not unexpected by security analysts, as more crucial corporate data is stored off-site in the cloud. This shift indicates a progression in the tactics used by cybercriminals, suggesting that the evolution from ransomware to ransom attacks was a result of the changing landscape and opportunities presented by the cloud storage of data [33507].
Capability (Incompetence/Accidental) development_incompetence, accidental (a) The software failure incident related to development incompetence is evident in the article. The article discusses how hackers broke into a website, took control of the encryption system, changed the keys, and rendered the website or web app inoperable. This incident highlights the lack of professional competence in securing the website's encryption system effectively, leading to the failure [33507]. (b) The software failure incident related to accidental factors is also present in the article. It mentions a company being held to ransom after a critical web app was taken offline through the attack. The hackers had broken into the servers six months prior and waited until critical data had been encrypted, indicating an accidental failure in maintaining the security of the web app [33507].
Duration permanent (a) The software failure incident described in the article is more aligned with a permanent failure. The ransomware attacks on websites, known as "RansomWeb," involve hackers breaking into a website, taking control of the encryption system, changing the keys, and rendering the website or web app inoperable by stopping it from accessing essential information or code [33507]. These attacks are described as causing unrepairable damage and being difficult to prevent, indicating a long-lasting impact on the affected systems. Additionally, the article mentions that hackers are now driven by financial profit rather than attacking websites for glory or fun, signaling a shift towards more serious and long-term consequences for victims.
Behaviour crash, omission, value, other (a) crash: The article describes a ransomware attack where hackers take control of a website's encryption system, change the keys, and render the website or web app inoperable by stopping it from accessing essential information or code. This can be considered a form of a crash as the system loses its functionality and fails to perform its intended functions [33507]. (b) omission: The ransomware attack described in the article involves hackers breaking into a website, taking control of the encryption system, changing the keys, and rendering the website or web app inoperable. This can be seen as a form of omission where the system omits to perform its intended functions due to the actions of the hackers [33507]. (c) timing: The article does not specifically mention any timing-related failures where the system performs its intended functions but does so too late or too early. (d) value: The ransomware attack described in the article results in the system performing its intended functions incorrectly after the encryption keys are changed by the hackers, leading to the website or web app becoming inoperable. This can be considered a value-related failure where the system performs its functions incorrectly [33507]. (e) byzantine: The article does not mention any byzantine-related failures where the system behaves erroneously with inconsistent responses and interactions. (f) other: The behavior of the software failure incident described in the article can also be categorized as a form of denial of service (DoS) attack, where the hackers disrupt the normal functioning of the website or web app by changing the encryption keys and rendering it inoperable until a ransom is paid [33507].

IoT System Layer

Layer Option Rationale
Perception None None
Communication None None
Application None None

Other Details

Category Option Rationale
Consequence property (d) property: People's material goods, money, or data was impacted due to the software failure The software failure incident described in the article involves ransomware attacks on websites, where hackers take control of a site's encryption system, change the encryption keys, and demand ransom to restore access. In one case mentioned in the article, a company was reportedly held to ransom after a critical web app was taken offline through the attack. The hackers had encrypted critical data and removed the security key from the web server, rendering the app inoperable and sending a ransom demand to decrypt the data and restore service [33507].
Domain information, finance (a) The failed system in the article was related to the production and distribution of information. The incident involved ransomware attacks on websites, which affected the encryption keys needed to keep websites running, thus disrupting the flow of information on these sites [33507]. (b) There is no specific mention of the transportation industry in the articles. (c) There is no specific mention of the natural resources industry in the articles. (d) There is no specific mention of the sales industry in the articles. (e) There is no specific mention of the construction industry in the articles. (f) There is no specific mention of the manufacturing industry in the articles. (g) There is no specific mention of the utilities industry in the articles. (h) The incident did involve financial aspects as hackers demanded ransom from companies to decrypt crucial data and restore service, indicating a financial motive behind the attacks [33507]. (i) The incident did not directly involve the knowledge industry. (j) The incident did not directly involve the health industry. (k) The incident did not directly involve the entertainment industry. (l) The incident did not directly involve the government industry. (m) The failed system in the article was related to website security and data encryption, which falls under the broader category of the technology industry or cybersecurity sector.

Sources

Back to List