Analyzing Reporting on Ransomware Incidents: A Case Study
Abstract
:1. Introduction
- RQ (1)
- What aspects of ransomware are typically explained by typical news articles?
- RQ (2)
- What misconceptions (if any) might a typical reader get from this reporting?
2. Related Work
3. Technical Background
3.1. The CIA-Triad of Information Security
3.2. Cyberattacks
3.3. The Colonial Incident
3.4. Basic Defensive Concepts
3.4.1. Software Testing
3.4.2. Regular Updates
3.4.3. Secure Processes
3.4.4. Levels of Defenses
3.4.5. Fail Secure Deployment
4. Analysis 1: Introducing “Ransomware Attack”
- A ransomware attack is performed by
- (a)
- gaining access to a computer system and then (11 articles)
- (b)
- executing a program on the victim’s computer. (3 articles)
- One option (Data Loss) to execute a ransomware attack is by
- (a)
- denying access to specific systems or data (42 articles)
- (b)
- by encrypting data with the program and then (23 articles)
- (c)
- demanding money to restore access to this data (41 articles)
- (d)
- by providing the decryption key. (9 articles)
- Another option (Data Breach) for executing a ransomware attack is
- (a)
- copying sensitive data with the program and then (14 articles)
- (b)
- demanding money for keeping this data confidential. (13 articles)
5. Analysis 2: Detailed Information on Ransomware Attacks
5.1. Procedure of General Ransomware Attacks
- Payment of the ransom incentives further attacks. (9 articles)
- Access to the encryption key does not automatically enable one to get the system to run again. Instead, this can be a complex activity. (3 articles)
- Paying the ransom to access the decryption key cannot guarantee access to the (right) decryption key(s). (2 articles)
- The company behind the Colonial Pipeline paid the ransom but still struggled to rebuild the system. (1 article)
5.2. Vulnerabilities Enabling Ransomware Attacks
- Frequently, access to computer systems is gained by phishing. (3 articles)
- Leaked password lists might enable access to computer systems. (2 articles)
5.3. Defenses against Ransomware Attacks
6. Analysis 3: Presentation of the Incident
6.1. Chain of Events of the Incident
- First, there was a ransomware attack. Then, there was no fuel transport anymore. (14 articles)
- First, there was a ransomware attack. Then, the Pipeline shut down and there was no fuel transport anymore. (18 articles)
- First, there was a ransomware attack. Then, Colonial shut down the Pipeline, stopping the fuel transport. (5 articles)
- First, there was a ransomware attack. Then, Colonial shut down the Pipeline because their billing system was disabled. Then, there was no fuel transport. (5 articles)
6.2. Framing of the Incident
6.3. Attributing for the Incident
- The attack was executed by DarkSide. (18 articles)
- The attack was executed with the software of DarkSide. (4 articles)
- The attack was executed either by DarkSide or by hackers using the software of DarkSide. (2 articles)
- The attack was executed by a criminal group. (1 article)
6.4. Political Consequences of the Incident
- Companies must now report cybersecurity incidents. (10 articles)7
- Companies are now being demanded to assess the security of their systems. (10 articles, no further details were provided)
- The USA should pressure Russia because they do not act against ransomware groups in their territory. (9 articles)
- Biden signed a new executive order for more security. (8 articles, no further details were provided in these articles)
- There should be higher mandatory and technical security standards. (7 articles, all gave at least one example)8
- The government should go after cryptocurrencies (7 articles, two of which outlined how this would be possible)
- There is now a task force at the justice department. (6 articles, no further details were provided)
- More money should be invested. (5 articles, no details)
7. Analysis 4: Potential Misconceptions
7.1. Misconception 1: Bad Weather
7.2. Misconception 2: Bank Robbery
7.3. Misconception 3: Easy Attribution
7.4. Misconception 4: Innocent Victim
8. Implications
9. Limitations
10. Conclusions and Future Work
Supplementary Materials
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
1 | Usually, (cyber-)attacks are defined more abstractly. However, this definition is both sufficient for this paper and compatible with common definitions (c.f. Bay 2016; Kissel 2011). |
2 | The following summary of this incident is derived from the consensus of all media articles we read for our analysis. It represents our best effort to summarize the incident based on our knowledge at the time of submission. We have neither original data nor first-person insights, and some of the information provided here might turn out to be incomplete, misleading, or even wrong. |
3 | The articles did not mention that this does not help against the second attack option. |
4 | The article does not mention this does not help against the first attack option. |
5 | Articles are classified by the most detailed description that applies. |
6 | Consequences are only denoted in this list, if they were presented as consequences. Phrases such as “The attackers profited from low cybersecurity standards” do not count towards “There should be higher cybersecurity standards”. Ten additional consequences were denoted in fewer articles, including one article arguing that companies should be liable for damages caused to customers because of cyberattacks. |
7 | This demand, as well as the second and last in this list stems from an executive order issued by Biden after the attack. |
8 | Four more articles mentioned that low standards are a problem. Three further articles demanded higher standards, but it is unclear whether these articles refer to technical standards or proposals such as having to report incidents. One further article mentioned that some companies do not treat security earnestly enough. |
9 | We do not claim that either of the stories are objectively appropriate for this specific incident: The contextual information to objectively and definitely judge one way or the other is either disputed or not available to the public (including the authors). |
10 | Due to these problems, rather than using the programmable search engine, the second author used the internal search engine of the tech blogs and manually collected all articles between 6 May 2021 and 1 August 2021. The same was true for the Houston Chronicle and the Star Tribute. For unclear reasons, only a total of five articles could be found for the Star Tribune, among a large number of dead links. |
References
- Alwan, Almahdi Ali. 2011. Misconception of heat and temperature among physics students. Procedia-Social and Behavioral Sciences 12: 600–14. [Google Scholar] [CrossRef]
- Australian Cyber Security Center. 2023. How to Update Your Device and Software. Available online: https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-update-your-device-and-software (accessed on 27 April 2023).
- Axell, Cecilia, Astrid Berg, Jonas Hallström, Sam Thellman, and Tom Ziemke. 2022. Artificial intelligence in contemporary children’s culture: A case study. In PATT 39. PATT on the Edge Technology, Innovation and Education. St. John’s, Newfoundland and Labrador, Canada June 21st–24th, 2022. St. John’s: Memorial University of Newfoundland, pp. 376–86. [Google Scholar]
- Bay, Morten. 2016. What is cybersecurity? French Journal for Media Research 6: 1–28. [Google Scholar]
- Beaubouef, Theresa, and Patrick McDowell. 2008. Computer science: Student myths and misconceptions. Journal of Computing Sciences in Colleges 23: 43–48. [Google Scholar]
- Benner, Katie, and Nicole Perlroth. 2021. U.S. seizes share of ransom from hackers in colonial pipeline attack. The New York Times, June 7. [Google Scholar]
- Bertrand, Natasha, Evan Perez, Zachary Cohen, Geneva Sands, and Josh Campbell. 2021. Colonial pipeline did pay ransom to hackers, sources now say. CNN, May 12. [Google Scholar]
- Brinda, Torsten, Michael Fothe, Steffen Friedrich, Bernhard Koerber, Hermann Puhlmann, Gerhard Röhner, and Carsten Schulte. 2008. Grundsätze und standards für die informatik in der schule-bildungsstandards informatik für die sekundarstufe i. Bonn: Gesellschaft für Informatik e.V. [Google Scholar]
- Bustillo, Miguel. 2021. Cyberattack forces closure of largest U.S. refined-fuel pipeline. Wall Street Journal, May 8. [Google Scholar]
- Continella, Andrea, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, and Federico Maggi. 2016. Shieldfs: A self-healing, ransomware-aware filesystem. Paper presented at 32nd Annual Conference on Computer Security Applications, Los Angeles, CA, USA, December 5–8; pp. 336–347. [Google Scholar] [CrossRef]
- Cybersecurity and Infrastructure Security Agency. 2023. Stop Ransomware|cisa. Available online: https://www.cisa.gov/stopransomware (accessed on 23 April 2023).
- Day, Lewin. 2021. The colonial pipeline is finally back online and pumping gas. The Drive, May 12. [Google Scholar]
- Diethelm, Ira, and Stefan Zumbrägel. 2010. Wie funktioniert eigentlich das internet?-empirische untersuchung von schülervorstellungen. In Didaktik der Informatik. Möglichkeiten empirischer Forschungsmethoden und Perspektiven der Fachdidaktik. Bonn: Gesellschaft für Informatik e.V. [Google Scholar]
- Eigenberg, Helen, and Tammy Garland. 2008. Victim blaming. In Controversies in Victimology. London: Routledge, pp. 33–48. [Google Scholar]
- Greenberg, Andy. 2018. The untold story of notpetya, the most devastating cyberattack in history. Wired, August 22. [Google Scholar]
- Hadnagy, Christopher. 2010. Social Engineering: The Art of Human Hacking. Hoboken: John Wiley & Sons. [Google Scholar]
- Hassan, Nihad. 2019. Ransomware Revealed. Cham: Springer. [Google Scholar]
- Hatziapostolou, Thanos, Anna Sotiriadou, and Petros Kefalas. 2008. Promoting computer science programmes to potential students: 10 myths for computer science. Paper presented at the 3rd Informatics Education Europe, Venice, Italy, December 4–5. [Google Scholar]
- Hennecke, Martin. 2015. Modellvorstellungen zum aufbau des internets. In Informatik Allgemeinbildend Begreifen. Bonn: Gesellschaft für Informatik e.V. [Google Scholar]
- Hoffmann, Dirk. 2013. Software-Qualitat. Berlin: Springer. [Google Scholar]
- Hu, Siqi, Carol Hsu, and Zhongyun Zhou. 2022. Security education, training, and awareness programs: Literature review. Journal of Computer Information Systems 62: 752–64. [Google Scholar] [CrossRef]
- Institute for Security and Technology. 2021. Combating Ransomware. Available online: https://securityandtechnology.org/wp-content/uploads/2021/09/IST-Ransomware-Task-Force-Report.pdf (accessed on 27 April 2023).
- Kaczmarczyk, Lisa C., Elizabeth R. Petrick, J. Philip East, and Geoffrey L. Herman. 2010. Identifying student misconceptions of programming. Paper presented at 41st ACM Technical Symposium on Computer Science Education, Milwaukee, WI, USA, March 10–13; pp. 107–111. [Google Scholar]
- Kaltakci, Derya, and Nilüfer Didiş. 2007. Identification of pre-service physics teachers’ misconceptions on gravity concept: A study with a 3-tier misconception test. In AIP Conference Proceedings. College Park: American Institute of Physics, vol. 899, pp. 499–500. [Google Scholar]
- Kharraz, Amin, William Robertson, Davide Balzarotti, Leyla Bilge, and Engin Kirda. 2015. Cutting the gordian knot: A look under the hood of ransomware attacks. Paper presented at 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Milan, Italy, July 9–10; pp. 3–24. [Google Scholar]
- Kissel, Richard. 2011. Glossary of Key Information Security Terms. Collingdale: Diane Publishing. [Google Scholar]
- Krauss, Clifford. 2021. Colonial pipeline chief says an oversight let hackers into its system. The New York Times, June 8. [Google Scholar]
- Krutz, Ronald L., and Russell Dean Vines. 2010. Cloud Security: A Comprehensive Guide to Secure Cloud Computing. Hoboken: John Wiley & Sons Inc. [Google Scholar]
- Kuckartz, Udo. 2019. Qualitative Text Analysis: A Systematic Approach. Cham: Springer International Publishing, pp. 181–97. [Google Scholar] [CrossRef]
- Lucariello, Joan, and David Naff. 2013. How Do I Get My Students over Their Alternative Conceptions (Misconceptions) for Learning. Washington, DC: American Psychological Association. [Google Scholar]
- Marks, Joseph. 2021. The cybersecurity 202: Our expert network says it’s time for more cybersecurity regulations. The Washington Post, June 11. [Google Scholar]
- McIntosh, Timothy, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, and Paul Watters. 2021. Ransomware mitigation in the modern era: A comprehensive review, research challenges, and future directions. ACM Comput. Surv. 54: 197. [Google Scholar] [CrossRef]
- McIntosh, Timothy R., Julian Jang-Jaccard, and Paul A. Watters. 2018. Large scale behavioral analysis of ransomware attacks. In Neural Information Processing. Edited by Long Cheng, Andrew Chi Sing Leung and Seiichi Ozawa. Cham: Springer International Publishing, pp. 217–29. [Google Scholar]
- Mertala, Pekka, Janne Fagerlund, and Oscar Calderon. 2022. Finnish 5th and 6th grade students’ pre-instructional conceptions of artificial intelligence (ai) and their implications for ai literacy education. Computers and Education: Artificial Intelligence 3: 100095. [Google Scholar] [CrossRef]
- Mohyuddin, Rana Ghulam, and Usman Khalil. 2016. Misconceptions of students in learning mathematics at primary level. Bulletin of Education and Research 38: 133–62. [Google Scholar]
- Morrison, Sara. 2021. How a major oil pipeline got held for ransom. Vox, June 8. [Google Scholar]
- Nakashima, Ellen, Lori Aratani, and Douglas MacMillan. 2021. Colonial hack exposed government’s light-touch oversight of pipeline cybersecurity. Houston Chronicles, May 30. [Google Scholar]
- Newman, Lily Hay. 2017. The ransomware meltdown experts warned about is here. Wired, May 12. [Google Scholar]
- Ojose, Bobby. 2015. Students’ misconceptions in mathematics: Analysis of remedies and what research says. Ohio Journal of School Mathematics 72: 30–34. [Google Scholar]
- Open Web Application Security Project. 2023. Open Web Application Security Project: Owasp Top Ten. Available online: https://owasp.org/www-project-top-ten/ (accessed on 27 April 2023).
- Pancratz, Nils, and Alexander Schlegel. 2021. Lehrerperspektiven auf die rekonstruktion von schüler-vorstellungen im informatikunterricht. In INFOS 2021-19. GI-Fachtagung Informatik und Schule. Bonn: Gesellschaft für Informatik. [Google Scholar]
- Pohlmann, Norbert. 2019. Cyber-Sicherheit: Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und Eigenschaften von Cyber-Sicherheitssystemen in der Digitalisierung. Wiesbaden: Springer Fachmedien Wiesbaden GmbHSpringer Vieweg. [Google Scholar]
- Proofpoint. 2023. What Is Ransomware? Available online: https://www.proofpoint.com/threat-reference/ransomware (accessed on 25 April 2023).
- Qian, Yizhou, and James Lehman. 2017. Students’ misconceptions and other difficulties in introductory programming: A literature review. ACM Transactions on Computing Education (TOCE) 18: 1–24. [Google Scholar] [CrossRef]
- Schott-Maire, Ulrike, Manuel Riel, and Ralf Romeike. 2021. Expertenmeinungen über bildung zur it-sicherheit: Was jeder mensch wissen sollte! In INFOS 2021-19. GI-Fachtagung Informatik und Schule. Edited by Ludger Humbert. Bonn: Gesellschaft für Informatik, pp. 83–92. [Google Scholar] [CrossRef]
- Shostack, Adam. 2014. Threat Modeling: Designing for Security. Indianapolis: John Wiley and Sons. [Google Scholar]
- Smith, Clifton L. 2003. Understanding concepts in the defence in depth strategy. Paper presented at IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, Taipei, Taiwan, October 14–16; pp. 8–16. [Google Scholar] [CrossRef]
- Smith, Clifton L., and Robinson Mike. 1999. The understanding of security technology and its applications. Paper presented at IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No. 99CH36303), Madrid, Spain, October 5–7; pp. 26–37. [Google Scholar]
- Staatsinstitut für Schulqualität und Bildungsforschung München. 2023. Lehrplan Natur und Technik (Informatik). Available online: https://www.lehrplanplus.bayern.de/fachlehrplan/gymnasium/7/nt_gym (accessed on 15 January 2022).
- Tsarava, Katerina, Manuel Ninaus, Tereza Hannemann, Kristina Volná, Korbinian Moeller, and Cyril Brom. 2020. Fostering knowledge of computer viruses among children: The effects of a lesson with a cartoon series. In Paper presented at Koli Calling’20: Proceedings of the 20th Koli Calling International Conference on Computing Education Research, Koli, Finland, November 19–22; pp. 1–9. [Google Scholar]
- Uhden, Olaf. 2016. Verständnisprobleme von schülerinnen und schülern beim verbinden von physik und mathematik. Zeitschrift für Didaktik der Naturwissenschaften 22: 13–24. [Google Scholar] [CrossRef]
- Vom Hofe, Rudolf, and Werner Blum. 2016. “grundvorstellungen” as a category of subject-matter didactics. Journal für Mathematik-Didaktik 37: 225–54. [Google Scholar] [CrossRef]
- Wang, Pei. 2007. Three fundamental misconceptions of artificial intelligence. Journal of Experimental & Theoretical Artificial Intelligence 19: 249–68. [Google Scholar]
- Wang, Pei, Kai Liu, and Quinn Dougherty. 2018. Conceptions of artificial intelligence and singularity. Information 9: 79. [Google Scholar] [CrossRef]
- Yang, T. Andrew. 2001. Computer security and impact on computer science education. Journal of Computing Sciences in Colleges 16: 233–46. [Google Scholar]
- Zetter, Kim. 2021. Us gov issues emergency order while colonial pipeline is down. Zero Day, May 9. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Greubel, A.; Andres, D.; Hennecke, M. Analyzing Reporting on Ransomware Incidents: A Case Study. Soc. Sci. 2023, 12, 265. https://doi.org/10.3390/socsci12050265
Greubel A, Andres D, Hennecke M. Analyzing Reporting on Ransomware Incidents: A Case Study. Social Sciences. 2023; 12(5):265. https://doi.org/10.3390/socsci12050265
Chicago/Turabian StyleGreubel, André, Daniela Andres, and Martin Hennecke. 2023. "Analyzing Reporting on Ransomware Incidents: A Case Study" Social Sciences 12, no. 5: 265. https://doi.org/10.3390/socsci12050265
APA StyleGreubel, A., Andres, D., & Hennecke, M. (2023). Analyzing Reporting on Ransomware Incidents: A Case Study. Social Sciences, 12(5), 265. https://doi.org/10.3390/socsci12050265