Ransomware attacks have been around for many years. In the past, cyber-threat actors would penetrate a company’s computer and network systems and obtain data with the objective of returning it upon payment. The demanded payments were usually smaller than the ransoms requested in recent incidents. Most of these incidents weren’t financially material, nor were they reported publicly.
By contrast, today’s ransomware perpetrators execute well-orchestrated attacks accompanied by more significant financial demands. These incidents don’t focus on simple “theft” of data; instead, their intent is to disrupt the business. During a ransomware event, cyber attackers may contact and converse directly with their victims, offering a well-articulated list of demands along with clear threats of further business disruption if demands aren’t met. The attackers may bargain over the amount of payment, promoting quick resolution to the attack, with guarantees of full recovery when their demands are satisfied.
The impacts to businesses affected by a ransomware attack can take many forms. Several recent attacks have targeted businesses in industries where the level of cybersecurity investments is generally less than businesses with higher security profiles, such as those operating critical infrastructure or subjected to regulations prompting increased investment in cybersecurity.
Companies affected by ransomware become victims when a perpetrator finds a security weakness that enables access to an organization’s systems. Aggressive ransomware gangs use various techniques to gain access to systems. Common strategies include:
The human perimeter may be just as important as the technical perimeter. The cybersecurity mindset of a company’s employees may be one of its most important ransomware defense mechanisms. Their awareness of the risks and vigilance as data defenders make it more difficult for cybercriminals to obtain sensitive information or deceive unsuspecting users into downloading an infected file. Training and constant reinforcement through simulated phishing email testing can transform employees into a resilient line of defense against unusual email messages, attachments from unfamiliar parties and running unrecognized apps downloaded from the internet.
Anti-malware software, kept up to date, offers protections from phishing and malware attacks by detecting and blocking malicious files and warning users when they’re visiting suspicious websites. Secure email gateways filter inbound and outbound email communications to identify threats and prevent their delivery, stopping ransomware files in their tracks. Post-delivery protection solutions powered by machine learning systems or artificial intelligence algorithms can stop advanced email threats that penetrate the email network. Organizations can also use web filtering solutions to restrict user access to certain websites.
The impact of ransomware attacks has increased in velocity. The current generation of ransomware attacks are orchestrated through preplanned, strategic campaigns of reconnaissance, penetrating the organization’s attack surface, and quickly exfiltrating data. Campaigns continue with the extortion receipt, outlining actions requested of the victim.
If a business finds itself under attack, it’s critically important to follow all established cyber-incident response plans and operational resilience protocols to manage the incident. Due to the holistic impact associated with modern-day ransomware attacks, managing the actual incident requires a larger-scale crisis management approach. Such an approach enables organizations to effectively address the broader list of business processes these attacks impact, including the initiation of full recovery and data verification post-attack.
An in-process ransomware situation requires many new procedures, processes and skills to combat the attack. Examples include:
In the aftermath of a ransomware attack, it’s first things first: Conduct a postmortem on why and how it happened and take corrective action to prevent and detect future attacks more effectively. This assessment entails understanding how the attacker obtained the access needed to enable encryption and lock down company data. To that end, endpoint detection and response solutions which continuously monitor all incoming and outgoing traffic on a network for potential threats can provide transparency as to where the attack started and how it progressed. The business can use this insight to help prevent similar incidents from happening again.
Erasing ransomware from company systems is a priority in the aftermath of an attack. This task can be very difficult to accomplish with confidence if the criminals don’t provide the keys to decrypt the infected files. And, even if they do, how can management be confident the files are fully cleansed without wiping down all files and storage devices and starting anew?Using prior data backups can reduce the severity of an attack’s impact on the business. Daily data backups should include processes to store data off-site, without any connections to the organization’s IT systems.
Prevention, response and recovery are all about operational resilience, or the organization’s ability to detect, prevent, respond to, and recover and learn from cyberattacks and other operational disruptions that may impact delivery of important business and economic functions or underlying business services. There are six components to achieving resiliency:
Read the entire article here.
(The Bulletin — Volume 7, Issue 11)