Jump to content

Here’s How To Protect Against A Ransomware Attack


Karamjit

Recommended Posts

Recovering data encrypted by a ransomware attack is next to impossible, so prevention offers the better approach.

 

Ransomware attacks -- where online extortionists encrypt data on a victim’s computer and then demand a fee for unlocking it -- started off mainly as a consumer problem but increasingly is hitting businesses and government entities as well.

The trend has significantly heightened the need for organizations to have measures in place for blocking the threat and for mitigating damage to the extent possible. Most security experts agree that it is almost impossible to recover data that might have been encrypted in a ransomware attack without access to the decryption keys, or to a backup copy of the affected data.  

So the focus has to be on prevention.

“[Ransomware] is evil because if implemented correctly by the attackers … it is very difficult to recover the data on the machine,” says Engin Kirda, co-founder and chief architect at security vendor Lastline. “The key difference of this type of malware compared to traditional malware is that you often know that you have been infected because the malware tells you this."

Having a robust data backup process can go a long way in blunting the threat posed by ransomware. In fact, it is often the only way to recover data if you are unwilling to pay the ransom demanded by an extortionist. But there are other measures that organizations can take as well, including the following:

 

Authenticate In-Bound Email

Email is a commonly used method to distribute ransomware. Attackers target victims with cleverly spoofed emails that appear to originate from someone the victim knows. The emails have malicious attachments which when opened results in the ransomware being downloaded on the victim’s system.

One of the most effective ways for an organization to blunt this threat is to validate the origin of an email before it is delivered to the intended recipient, says Craig Spiezle, executive director and president of the Online Trust Alliance (OTA).

Implementing sender identity technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) can all protect organizations against spear phishing, business email compromise, and other threats posed by spoofed email, Spiezle says. They work by validating the IP address and domain of the server from which an email originates.

“Unfortunately, most corporations are not authenticating inbound mail,” Spiezle says. And when they do, the policies are not strong enough. For example, emails that fail authentication tests are often simply quarantined or sent to a junk folder.  Instead, “corporations that have sensitive information should have a reject policy for email that fail,” authentication tests, he says.

 

Protect Your Email Servers

Sender authentication can mitigate the risk of ransomware being delivered via email. But that alone is not sufficient, says Craig Young, security researcher at Tripwire. If you haven’t done so already, protect mail servers by scanning all stored, incoming, and outgoing mail. Such scanning can help organizations detect threats that might have evaded perimeter defenses or infiltrated the network via compromised systems and internal email. Numerous tools are available for scanning email servers for security threats. Take advantage of them, he says.

“Email authentication is a good measure to have,” Young says. “But there’s always a chance that a legitimate email server is used to send out spam emails,” and other malware, he says.

 

Add Ad Blocking

In addition to emails, attackers often distribute ransomware through malicious advertisements served up to users when they visit certain sites. Malvertisements allow attackers to target victims based on their browsing habits, location, demographic information, device characteristics, and other criteria. Ransomware served up via watering-hole attacks often tend to be more dangerous than random attacks because they are targeted at victims which the attackers know have the capability to pay up.

Blocking ads from being delivered on user systems or preventing users from accessing certain sites can diminish this risk somewhat, Spiezle says. Organizations that want to accommodate unrestricted access to the Internet for employees might consider implementing a separate network for them to do so, he says, pointing to one government contractor that has taken this approach.

 

Monitor File Activity 

With ransomware, an attack against an individual can quickly escalate into an attack against the enterprise, says Amichai Shulman, chief technology officer at Imperva. Many ransomware tools have the ability to encrypt not just the hard drive of a system, but also any shared files.

In fact, rapid file overwriting is one of the clearest markers of ransomware on your network, he says. So using a tool to monitor file activity is a good idea, says Shulman, whose company sells an activity-monitoring tool.

“If you are constantly monitoring access to file servers, there are very distinctive patterns that you can look for in order to detect ransomware,” on an endpoint, he says.

Such early detection can help organizations contain the damage that a ransomware tool can wreak, he says. “The advantage is that you can go quickly into quarantine mode for the infected machine and make sure it doesn’t connect to any other file server,” in the enterprise.

 

Keep Your Response Plan Handy

Time is critical for an organization faced with a ransomware deadline. Online extortionists typically give organizations a very specific time limit within which to pay -- fter which they sharply increase the ransom amount. Attackers have gotten increasingly better at knowing what an organization can afford and knowing exactly when to strike, Spiezle says. They deliberately don’t give enough time for an organization to figure out if it can try and unlock the data without paying any ransom.

So it is important to have a plan in place describing what needs to happen in the event of a ransomware attack. Do an inventory of your critical data assets, know where it is located, and evaluate that impact of any loss or unavailability of that data.

 “One of the worst things is the chaos that ensues during an incident like this. Emotions run high, people don’t have the answers and they are scrambling,” to respond. he says. “The last thing you want is to be doing a Google search for a local forensics experts at 2am on a Saturday morning.” 

 

From: http://www.darkreading.com/endpoint/heres-how-to-protect-against-a-ransomware-attack/d/d-id/1324169

Link to comment
Share on other sites


  • Replies 6
  • Views 1.3k
  • Created
  • Last Reply

I have to say that If someone is so dumb to start an unknown exe without any prevention measure, deserve ransomware.  We are in 2016, PCs are used for everything It's absurd so poor attention.

Link to comment
Share on other sites


As long as they only use the appdata folder to launch their crap I have no worry, since nothing inside that folder can run on any of my computers.  Same goes for the old temp folder in the windows directory.  And since i am actually using a VM most of the time (except on my game machine) if it could run it couldn't encrypt anything I care about and it is just a matter of deleting the VM and copying the backup over it.  Hackers are so stupid, really.

Link to comment
Share on other sites


1 hour ago, straycat19 said:

As long as they only use the appdata folder to launch their crap I have no worry, since nothing inside that folder can run on any of my computers.  Same goes for the old temp folder in the windows directory.  And since i am actually using a VM most of the time (except on my game machine) if it could run it couldn't encrypt anything I care about and it is just a matter of deleting the VM and copying the backup over it.  Hackers are so stupid, really.

Sadly, not everyone is fortunate enough to have a machine powerful enough to handle VMs that easily, most importantly, not everyone has the tech skills and time to do so. Most people use laptops to do their stuff and not everyone knows about security and defending themselves, sometimes they think of PCs as a tool, or maybe like a TV or a fridge.

 

Education is important, but since software focuses on getting as many developers on a certain platform as possible, it became a nightmare, trying to find a good, secure and reliable software nowadays.

 

I don't really know where solving this should start from.

Link to comment
Share on other sites


If the ransomware is delivered using a drive-by-download then they dont have a choice whether to run a unknown exe or not.  Thats where malwarebytes anti-exploit and malwarebytes anti-ransomware comes into play and without those common sense and updated flash and java alot of the drive-by-downloads use outdated flash and java to deliver there payload and making sure you have the right settings set works to.

Link to comment
Share on other sites


i use cryptoprevent (2possible options) free version just the same as payed version (payed version gives email notification and does updates by itself.) free does not send email and does not update by itself.

https://www.foolishit.com/cryptoprevent-malware-prevention/

 

nice software

1 minute ago, eurobyn said:

that helps you keeping safe.

 

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...