Page 250 - COSO Guidance Book
P. 250

A ransomware case where the infected entity did not pay the ransom occurred in the city of Atlanta,
            Georgia. This case is notable because the city had incurred costs of $2.6 million to recover data
                                                    13
            encrypted by the ransomware “SamSam.”  The perpetrators had requested $50,000 in bitcoin to provide
            codes to decrypt the affected files. SamSam also infected other entities, including health care
            organizations. SamSam infections occurred all over the world, including Portugal, Australia, Israel, and
                           14
            other countries.

            Controls to prevent malicious software from infecting your computer devices were addressed previously
            in the phishing discussion.

            Mobile malware — Mobile devices include devices such as laptops, tablets, smartphones, and
            smartwatches. Because they compose a large percentage of all types of mobile devices, this discussion
            will focus on threats to smartphones. It should be noted that many of the threats and controls relevant to
            smartphones can be extrapolated to many other types of mobile devices.

            A global study found overwhelmingly that, in advanced economies, smartphone ownership is higher than
            in emerging economies. The study also found that, in emerging economies, smartphone ownership
                                                                              15
            comprises the highest percentage of ownership of all mobile phones.  Another study noted that,
            worldwide, over 35% of people own smartphones and over 66% own mobile devices (smartphones,
                                                                                                16
            tablets, etc.). This study notes there are more than 2.71 billion smartphones in the world.
            Ransomware, phishing emails, and other malicious software can infect mobile devices. One type of
            malware that can be installed on smartphones is spyware. However, not all spyware is malware. Many
            parents use spyware to monitor their children’s use of their smartphones.

            A popular spyware program is mSpy. Similar to many other spyware programs, mSpy provides for

            1.  GPS tracking
            2.  Reading text messages, even deleted ones
            3.  Viewing call history
            4.  Reading emails
            5.  Keylogging software (records keystrokes)
            6.  Viewing photos and videos
            7.  Monitoring internet activities
            8.  Keyword alert (use of certain words, like “drugs”)
            9.  Access to contacts and calendars
            10. Incoming call blocking
                                                                                                 17
            11. Invisible mode — mSpy app can be run so smartphone user doesn’t know it’s running




            13
              https://www.wired.com/story/atlanta-spent-26m-recover-from-ransomware-scare/
            14  https://www.symantec.com/blogs/threat-intelligence/samsam-targeted-ransomware-attacks
            15
              https://www.pewresearch.org/global/2019/02/05/smartphone-ownership-is-growing-rapidly-around-the-world-
            but-not-always-equally/pg_global-technology-use-2018_2019-02-05_0-01/
            16
              https://www.bankmycell.com/blog/how-many-phones-are-in-the-world
            17
              https://www.mspyreview.net/  mSpy provides multi-language support.

            © 2020 Association of International Certified Professional Accountants. All rights reserved.    5-16
   245   246   247   248   249   250   251   252   253   254   255