Jump to content

A Wall Against Cryptowall? Some Tips for Preventing Ransomware


steven36

Recommended Posts

A lot of attention has been paid lately to the Cryptowall / Ransomware "family" (as in crime family) of malware.  What I get asked a lot by clients is "how can I prepare / prevent an infection?"

 

"Prepare' is a good word in this case, it encompasses both prevention and setting up processes for dealing with the infection that will inevitably happen in spite of those preventative processes.  Plus it's the first step in the Preparation / Identification / Containment / Eradication / Restore Service / Lessons Learned Incident Handling process (see SANS SEC 504, or ask anyone with "GCIH" after their name)

 

My best advice is -  look at how the infection happens, and make this as difficult as possible for the attacker, the same as you would try to prevent any malware.  Most malware these days outsources the delivery mechanism - so Cryptowall is typically delivered by an exploit "kit".  These days, that typically means the Angler, Rig, or maybe Nuclear exploit kits (Angler being the most prevalent at the moment).  These kits aren't magic, they generally try to exploit old versions of Java, Flash, Silverlight or take advantage of missing  Windows updates.  When patches come out, the authors of these kits reverse the patches and bolt the exploits into their kit.  We've analyzed several versions of these kits over the last few years, most recently Manuel's post last week

 

So to help prevent these kits from working, we need to give them fewer toeholds in your environment - start by uninstalling these add-ons across the board:

If you can't uninstall them, be sure that you are patched up, and that as new patches and updates come out you have an AUTOMATED way of keeping them up to date.  But seriously, if you can, uninstall them.  Maybe you needed Java and Flash 5 years ago, my bet is that you don't need them now.  Any you likely never needed Silverlight. 

 

Keep your windows desktops and servers patched up.  Patch on Patch Tuesday already!!  Patch Tuesday was yesterday - have you patched yet?  Have your rebooted your patched servers yet so the patches are actually live?  Is there a really good reason why not?

 

Know what's on your network, and be sure it's all patched as patches and updates are released.  If you've got old gear that isn't being updated anymore, it's time to retire and replace those stations.
Know what software is running on each of your workstations, and be sure that's all patched or updated as updates come out.  


Hardware, OS and Software inventory is one of the basics - you need to automate this as much as possible, because not everything on the network always comes in through IT.  Think TV's, projectors, exersize equipment, thermostats and HVAC systems, door controls, fridges and teapots (yes teapots) - the list only starts there.  Everybody seems to be entitled to bolt things onto your network. 


Those "appliances" on your network aren't immune to malware, they're likely more susceptible because they don't get patched.  That 20 Ton press on your shop floor?  That IV pump?  They're both likely running a 10 year old OS (either XP or a Linux variant).  Even if you bought them last week they might be running an OS that old, even in the best case it'll be months or years behind in patches.


Uninstall any software that you don't need.  You can't infect what isn't there.


Be sure that folks aren't running as administrator on their workstations, and don't have access to that set of rights.

 

Is that it you ask?  Nope - cryptowall almost always comes in via email as SPAM.  If you don't have a decent anti-spam solution, it's time to get one!  If your firewall has the capability of running attachments in a sandbox (for instance, Palo Alto and Cisco both have this), it's time to crank this feature up.

 

Block attachments that will execute  (exe's, msi's, scr's, jar's, cmd, bat, etc)

 

Block zip files with passwords

 

What else should you have in place?


Using Group Policy, force your users to store their data on a network share rather than their local disk (redirect "my documents" etc).


Be sure that you have control of the ACLs on your server shares.  The days of "we trust our users" are long gone - you can't trust your users' malware, so if you don't have a "you have access to what you need and only that" policy, it's time.  Those "permit all" directories were all created in teh 1990's, and it's time to rethink them - "Read Only" is your friend!  There is very little data in your organization that everyone needs read/write access to, but that's what we so often see, and that's what things like Cryptowall takes advantage of.

 

Also using Group Policy, disable Macro's in Microsoft Office, and disable VBS while you're at it.  You can do this station by station, but the true win for a medium to large organization is using Group Policy to enforce a consistent set of rules across the board.  The Australian Cyber Security Center has a nice document that outlines possible settings, depending on how your organization's requirements.  Me, I'd say disable all of it. 

 

As awesome as document automation is, running someone else's automation to destroy your data is the exact opposite of awesome!  If you use automation within your organization, trust your own macros and disable the rest (yes, you can do that and yes, it's easy - stay tuned, I'll write this up in the next week or so).

Get some semblance of a Security Awareness program going in your workplace.  Folks should know NOT to click links or open attachments in email.  This won't protect them from malvertising, but it's a great start.  It also won't protect you after that "second click".  Once a user has clicked "OK" to run malware, each successive click comes easier and with less thought.  After the second click it's a foregone conclusion, they're determined to get to the end - if the malware is any good that person (and their workstation) is compromised.

 

Hopefully, with the list above, you've got a number of layers in your defence-in-depth (yes, I had to say it) strategy.  But in the end, the link between the keyboard and the chair really is your last line of defense.

Have an incident response plan.  Be sure that nobody is talking about "cleaning" workstations or servers.  The absolute best recovery from any malware infection is "nuke from orbit" - wipe the drive and re-image from scratch.

 

BE SURE YOUR BACKUPS ARE UP TO DATE.  Be sure that you can recover yesterdays files, last week's files and last month's files.  Cryptowall attacks are often delayed, so that they get better coverage to help avoid detection.  Know that in the end, you will be compromised, and you will need to do the Incident Response and data recovery thing.

 

Does this list sound familiar?  I'm hoping so - essentially it's the first 14 of the 20 CIS Critical Controls https://www.sans.org/critical-security-controls and https://www.cisecurity.org/critical-controls/.

 

Is this list complete? I'm guessing not - what important thing am I missing?  Please, use our comment form and let us know what you've been doing to stem the tide of malware we're seeing lately.

 

===============
Rob VandenBrink
Compugen

 

The Source

Link to comment
Share on other sites


  • Replies 3
  • Views 1.1k
  • Created
  • Last Reply
stylemessiah

Ill quote myself from this post, been using this for years. Does take some setting up and the odd bit of maintenance if you use flash, but well worth it. It covers some of the points touched on in the OP

 

Visit the linked post for all details

 

Link to comment
Share on other sites


Another article written by a so-called expert who obviously has no experience in the business world.  If he did he would know that the following statement he made is not possible

Quote

So to help prevent these kits from working, we need to give them fewer toeholds in your environment - start by uninstalling these add-ons across the board:

  • Java
  • Flash
  • Silverlight

 

A majority of the web based software used in business and academics relies on Java and flash.  When it is disabled then the web based software cannot be used.

 

Business/Academic institutions do follow some stringent rules, such as no email attachments allowed from outside the organization.  Anyone desiring to send an attachment must upload it to an ftp server provided for that purpose, otherwise any attachment is deleted before the email is delivered.  Likewise all hyperlinks are deleted or reduced to pure text.  There are many other security implementations in these organizations but this is just an example.  You could further secure an organization by not allowing everyone to have access to outside email.  Only those whose job required outside email access would have it, everyone else would only have internal access.  It could be limited even more by only one person in each department having outside access and they would be responsible for forwarding mail to others in the department as required.  These email security plans exist and are being used in many organizations now.

Link to comment
Share on other sites


9 hours ago, straycat19 said:

Another article written by a so-called expert who obviously has no experience in the business world.  If he did he would know that the following statement he made is not possible

 

A majority of the web based software used in business and academics relies on Java and flash.  When it is disabled then the web based software cannot be used.

 

Business/Academic institutions do follow some stringent rules, such as no email attachments allowed from outside the organization.  Anyone desiring to send an attachment must upload it to an ftp server provided for that purpose, otherwise any attachment is deleted before the email is delivered.  Likewise all hyperlinks are deleted or reduced to pure text.  There are many other security implementations in these organizations but this is just an example.  You could further secure an organization by not allowing everyone to have access to outside email.  Only those whose job required outside email access would have it, everyone else would only have internal access.  It could be limited even more by only one person in each department having outside access and they would be responsible for forwarding mail to others in the department as required.  These email security plans exist and are being used in many organizations now.

Why would you need flash or sliverlight in the business world ?

Anyone still using Java  should be migrating over too java Web Start because there doing away with it in you're browser soon.

If you was my IT and i had to use Java  and you had not migrated me to  java Web Start I would fire you.

And if didn't you apply needed security  updates Id fire you .

Some of the stuff you suggest is a flat out security risk that even Oracle is doing away with. :P

No wonder there's so many breaches  in the business world security  ITs  still rely on minimum security .

Any any real IT has to do what the costumer wants if they want windows 10 you would have to install it or if they didn't you would have know how to prevent it from installing. You would have to be neutral if you're paycheck depended on it. 

Even the US Army  is asking for Windows 10 so a real IT would be learning how to service it.

 

 you hold contempt  against peploe before you check out who they are.

Quote

 

About the author Rob VandenBrink

Rob VandenBrink is a consultant with Metafore in Canada, specializing in Networking, Security and Virtualization. He has clients in manufacturing, finance and entertainment with locations in almost every time zone. He holds several industry certifications, as well as a Master's degree with the SANS Technology Institute.  He co-authors SANS SEC579 - Virtualization and Private Cloud Security.  Rob is also an Incident Handler with the Internet Storm Center - look for his posts at http://isc.sans.edu !

 

Were  is you're certifications?  Other then what you say on a news forum in the comments i dont see any ! :)

He seems qualified to me he has a Master's degree.

 

 

Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...