Whitepaper - Ransomware Protection PDF
Whitepaper - Ransomware Protection PDF
The current wave of ransomware families can have their roots traced back to the early
days of Fake AV, through “Locker” variants and finally to the file-encrypting variants that are
prevalent today. Each distinct category of malware has shared a common goal – to extort
money from victims through social engineering and outright intimidation. The demands for
money have grown more forceful and audacious with each iteration with some hackers now
demanding millions.
Despite rumors of the demise of ransomware, it is still very much alive and kicking. A
Sophos survey of 3,100 organizations found that 30% of cyberattack victims had been hit by
ransomware. Additionally, and of concern, nine in 10 respondents said their organization was
running up to date cybersecurity protection at the time of the attack.
ÌÌ Criminals use skillful social engineering to prompt users to run the ransomware’s
installation routine. They try to trick users into activating the ransomware with
emails that encourage the recipient to click on a link or open a file, for example: “My
organization’s requirements are in the attached file. Please provide me with a quote.”
ÌÌ Inadequate backup strategy and lack of disaster recovery practice/plan (backups not
offline/off-site)
ÌÌ Updates/patches for operating system and applications are not implemented swiftly
enough or at all
ÌÌ Dangerous user permissions (users work as administrators and/or have more file rights
on network drives than necessary for their tasks)
ÌÌ Lack of user security training (“Which documents may I open and from whom,” “What is
the procedure if a document looks malicious,” “How do I recognize a phishing email?”)
ÌÌ Lack of layered security strategy so attackers often only need to overcome a single
hurdle
ÌÌ Inconsistent or incomplete security policies that leave gaps through which attackers
can enter
ÌÌ Conflicting priorities (“We know that this method is not secure but our people have to
work…”)
ÌÌ Poorly configured IT security (badly regulated external access, e.g. Remote Desktop
Protocol exposed)
ÌÌ Malicious emails
Malicious emails
Today’s criminals are crafting emails that are indistinguishable from genuine ones. They are
grammatically correct with no spelling mistakes, and often written in a way that is relevant
to you and your business.
In this example, the zip file appears to contain an ordinary .txt file.
However, when the file is executed, the ransomware is downloaded and installed onto your
computer. In this example the Trojan horse is actually a JavaScript file disguised as a .txt
file, but there are many other variations on the malicious email approach, such as a Word
document with macros, and shortcut (.lnk) files.
You browse to the hacked website and click on an innocent-looking link, hover over an ad,
or in many cases just look at the page. And that’s enough to download the ransomware file
onto your computer and run it, often with no visible sign until after the damage is done.
RDP
RDP is what allows people to control Windows computers via a full graphical user interface,
over the internet. The millions of internet-connected computers running RDP includes
everything from cloud-hosted servers to Windows desktops used by remote workers, and
each one is a potential gateway into an organization's internal network.
While RDP is an immensely useful tool for organizations, RDP servers are protected by no
more than a username and password, and many of those passwords are bad enough to be
guessed, with a little (sometimes very little) persistence.
6 of 5.2 million exposed RDP ports utilizing a simple and free search engine
For more information on securing you RDP servers, read our white paper RDP Exposed – The
Threat That's Already at Your Door.
2. This then triggers a download of the ransomware which executes and encrypts files
3. A ransom note is generated demanding payment for files to be unencrypted
4. Wait for the victim to contact them via email or a dark web website
Should the chain break at any stage, the attack automatically ends.
Targeted ransomware
Targeted ransomware is a very manual attack, typically focuses on one victim at a time
and often demands much higher ransom fees. The attackers gain access to the network
and move laterally; identifying high value systems in the process. Strains of this type of
ransomware, overcome challenges as they arise, making them particularly deadly.
To learn more about current news on ransomware attacks across the globe, please visit
Naked Security, Sophos’s award-winning threat news room.
2. Backup regularly and keep a recent backup copy off-line and off-site
There are dozens of ways other than ransomware that files can suddenly vanish, such as
fire, flood, theft, a dropped laptop, or even an accidental delete. Encrypt your backup and you
won’t have to worry about the backup device falling into the wrong hands. Furthermore, a
disaster recovery plan that covers the restoration of data and whole systems.
XG Firewall offers flexible and easy segmentation tools like zones and VLANs to secure your
LAN and reduce the risk of lateral movement, reducing surface area of attack and minimizing
the risk and potential scope of propagation.
Furthermore, Sophos Managed Threat Response (MTR) enables 24/7 threat response
actions to be identified and executed utilizing a fusion of machine and machine intelligence.
More than 100 million users in 150 countries rely on Sophos as the best protection against complex threats and data loss. Sophos is
committed to providing complete security solutions that are simple to deploy, manage, and use that deliver the industry's lowest total
cost of ownership. Sophos offers award winning encryption, endpoint security, web, email, mobile, server and network security backed by
SophosLabs – a global network of threat intelligence centers. Read more at www.sophos.com/products.
United Kingdom and Worldwide Sales North America Sales Australia and New Zealand Sales Asia Sales
Tel: +44 (0)8447 671131 Toll Free: 1-866-866-2802 Tel: +61 2 9409 9100 Tel: +65 62244168
Email: [email protected] Email: [email protected] Email: [email protected] Email: [email protected]