Transcript
Jim Love (0:00)
Ransomware payments dropped 35% in 2024 as victims resist hackers demands. Treasury's Doge access sparks a national security crisis as contractors sound the alarm. And will you have recovery with that? This is Cybersecurity Today. I'm your host Jim Love. Global ransomware payments plummeted to 813 million in 2024, down from 2023's record high of 1.25 billion, marking a significant shift in the cybersecurity landscape. The decline comes despite high profile attacks on organizations like Krispy Kreme and NHS Trusts, suggesting a turning point in how victims respond to digital extortion. The drop was particularly Sharp in the second half of 2024 following major law enforcement actions against the notorious ransomware groups like Lockbit and Black Cat alfv. For years now, the cybersecurity landscape seemed hurtling towards a so called ransomware apocalypse, according to Jacqueline Burns Coven, head of Cyber Threat Intelligence at Chainalysis. According to new data from Chainalysis, the drop was particularly Sharp in the second half of 2024 following major law enforcement actions against notorious ransomware groups like Lockbit and Black Cat Alfie. The decline represents more than just improved defenses. It signals a growing resistance to paying ransoms, with actual payments running 53% lower than amounts demanded by attackers. The sharp decline speaks to the effectiveness of law enforcement actions, improved international collaboration and a growing refusal by victims to cave into attackers demands. The shift has reshaped the ransomware ecosystem with newer groups targeting smaller organizations for more modest sums. However, experts warn that the progress remains fragile. While payments are down, the number of reported incidents on dark web leak sites hit an all time high, suggesting attackers are simply finding fewer victims willing to pay. Others have warned that it's only a matter of time until ransomware groups reassemble or are replaced by other large players. Man, I try to stay away from politics, but this is one of the biggest security exposures in US history and we have to cover it. The crisis began when Treasury Secretary Scott Besant granted two Doge employees read only access to the department's payment system in January of this year. The decision immediately triggered alarm bells across the intelligence community, culminating in a federal judge in Manhattan issuing a preliminary injunction barring Doge from accessing treasury databases containing personally identifiable information. The situations grew more complex as details emerged about the Doge team members backgrounds. Edward Korostein, a 19 year old doge member, was previously fired from Path Network for leaking company secrets. According to Bloomberg News, Korstein later bragged on discord about retaining access to his former employer systems, stating that he had access to every single machine but never exploited it because it's just not me. Adding to the controversy, Booze Allen Hamilton dismissed a subcontractor who authored a draft report warning that Doge's access posed an unprecedented insider threat risk to government secrets. The draft report was prepared by a subcontractor to Booz Allen and contained unauthorized personal opinions that are not factual or consistent with our standards, the company stated Friday night, announcing that they would seek to have the report amended or retracted. Oh my God. If you trust the report from Booz Allen after that, I'm just sorry for you. The broader implications of this security breach are particularly concerning for intelligence operations. The Treasury Department payment systems contain sensitive information about payments to human intelligence sources working for the CIA and the dia. These assets, operating both domestically and abroad, could face life threatening risks if their identities were exposed through the payment data. A recent on call column from the Register told a story about the dangers of untested backup systems. A senior developer and help desk technician, we'll call him Lionel, inherited responsibility for managing backups for a mainframe software development team. What he uncovered was a ticking time bomb. His predecessor, we'll call him Richard, had been diligently performing daily backups onto 8 millimeter tapes, but he had never once verified them. Richard, when challenged, said his job was to ensure backups were taken, not to check whether they were usable. And he had checked that they had indeed completed successfully. So Lionel attempted a test restore and he found the tapes unreadable. Years of backup had been rendered useless due to a lack of maintenance. And sadly, the story rings so true when Lionel did manage to get a replacement for the now useless backup recording device and at least to recover some of the backup archive, he was not rewarded. He was questioned for the additional expense. Now, if this seems like fiction, you've never been in a data center watching a restore when the tape whips by in less than a minute because it's blank or you've never gotten caught where a supposed fail proof backup was missing a critical component which made the backup unrestorable for years after that. This person, let's call him Jim, insisted on surprise inspections where at any time the staff could be asked to restore any of our systems to a functional state. And I am sure that they got very tired of hearing Jim's line that backups were useless. All that counts are restores. So if this is what you're doing, I salute you. I hope you didn't have to learn the hard way but if you think this is overkill, I can only say I hope you never have to learn the hard way. But I won't feel sorry for you. When you order a backup, it should come with recovery included. It shouldn't be an extra. And that's our show. You can reach me with comments, questions or stories of your experience at editorialechnewsday cat or on LinkedIn. Or if you're watching this on YouTube, just leave a comment under the video. I'm your host, Jim Love. Thanks for listening.
