Ransomware Attack Risks PDF
Ransomware Attack Risks PDF
Malware is a common name for any software or code that uses unauthorized
and harmful actions onto your devices, operating systems, and your
cybersecurity.
The objectives of malware can be varied. The most widespread ones are:
acquiring confidential and sensitive data such as financial, commercial,
banking, political or intellectual property information, often for financial gain,
or simply damaging your operating system just for fun.
Different types of malicious software:
● The Trojan Horse is inspired by Greek mythology. The legend goes that Odysseus' idea
to hide Greek soldiers in a wooden horse covered with gold to take the city of Troy by the
ruse.
In computing, the principle is the same. The malware disguises (exploiting social
engineering) as a useful and secure program to convince the recipient to install it on his
computer environment. You get Trojans horses by downloading them thinking you are
downloading something else like an attachment of an email or software like a browser
extension.
Once the program is downloaded, the cybercriminal can access confidential data
contained in the computer or network, launch an attack, spy on activities or steal data.
Remote Access Trojan (RAT) is a popular Trojan attack that permits the attacker to
control the victim’s device. RATs are popular because they are easy to create and
spread. Millions of Trojans are created every month and the anti-malware writers are
having a hard time fighting them
Different types of malicious software:
● A computer Virus works as a real infectious agent. It is code that infects a software program.
“Virus” is the most common word known to the public when it comes to malware, but all
malware are not viruses and that is a good thing since viruses are difficult to get rid of.
After a virus is activated, it will replicate and spread to files and programs on the victim’s device.
Viruses are hard to clean up because this must be done by a legitimate program and the result is
often an elimination of the whole file since antivirus software has a hard time setting apart the
virus from the actual file.
● Spyware does not spread from host to host like a virus. It spies on the user's web browsing,
hidden in third-party software.
Spyware is often a program installed on your computer without you being aware of it. The
program enables its user to monitor your activity, behaviour, data you send and receive from and
on the device. The purpose of spyware is often to provide information to a third party. This kind
of activity is often used in law enforcement.
The presence of spyware means there is a weakness in your security system and you should run
a security check on your device/program to make sure not to let through other threats.
Different types of malicious software:
When you click on the fake warning, you are redirected to an infected web
page. These unethical advertising practices are used to frighten users into
purchasing or downloading rogue applications unknowingly.
The botnets (the infected computers) will react to the malware depending on
the command-and-control (C&C) server’s instructions.
Which companies are targeted with malware?
Most affected companies are the ones having vulnerabilities in their security
system. Those are often SMBs that overlook cyber security when it comes to
budget or SMBs thinking hackers are only interested in targeting bigger
organizations.
Since SMBs are usually not experts in cyber attacks and do not really measure
the importance of the information hackers obtain, they become easy targets
for cybercriminals.
According to the National Crime Agency report, the financial attacks have
become more advanced and less visible, affecting the banking systems.
Not only the traditional computer devices get attacked. Mobile devices and
social media as a whole – a place designed as much for individuals as for
companies– are getting more and more targeted. Cybercriminals are
increasingly exploiting the environments of familiarity on social media
platforms.
Ransomware attack risks
Ransomware attacks and the
the key is received from the attackers or not, having your data impacted by an attacker ultimately draws into
question the integrity of the data. An organization who has not considered the risks and impacts that result from
protocol, pirated software, and removable media. Commonly, ransomware is spread through social
engineering attacks, which include phishing or whaling attacks
that contain malicious links or attachments. When
the attachments are opened by the user, the malware automatically downloads and installs, typically
without the user even being aware. Ransomware can also be introduced into an organization’s
environment through drive-by downloads. A drive-by download occurs when a user visits a web page
and unknowingly downloads and installs malicious code. Remote desktop protocol is a secure
network communications protocol that allows IT admins to gain access to systems remotely. These
methods typically take advantage of, or exploit, browsers (and their plug-ins), applications, or
operating systems that are out of date or unpatched in order to infect users. The malware then
Restoring data from an older recovery point can result Any data touched by cybercriminals or malware
in a significant amount of lost business transactions or will bring into question the integrity of the data
other critical data
Paying the ransom can lead to being targeted Paying the ransom may not restore and/or
more in the future decrypt the data files
and Compliance, Internal Audit, and legal counsel have the necessary controls or requirements in place to
functions to be involved and work together in all aspects be eligible for coverage. The Internal Audit function
of ransomware preparation and response. Although IT should play an active role in reviewing the response
and work with IT Operations to ensure the responding to ransomware attacks. Lastly, all three
risk is assessed and treated appropriately. IT functions should coordinate in planning and executing
1 Step 1 Step 2 1
strategize enhance
effectively manage and address the risks
1
Ransomwar Strategy and
e planning
simulations
Step 1
Security
Disaster
Plan and strategize
configuration
recovery and
remediation and monitoring
Step 3 Step 2
Data access
incident
Digital
forensics
1 Plan and strategize
Implement and routinely test and enhance robust resiliency plans specific to ransomware attacks
to optimize the organization’s response in the event of a threat or attack. Resiliency plans should
be focused around an organization’s critical data sets.
1 Plan and strategize
Implement and routinely test and enhance robust resiliency plans specific to ransomware attacks
to optimize the organization’s response in the event of a threat or attack. Resiliency plans should
be focused around an organization’s critical data sets.
Implement and routinely test and enhance robust resiliency plans specific to ransomware attacks
to optimize the organization’s response in the event of a threat or attack. Resiliency plans should
be focused around an organization’s critical data sets.
Work with your organization’s legal counsel to purchase and routinely review cyber security
insurance for the organization
2 Prevent and enhance
A combination of preventive and detective controls should be employed in order to prevent an attack from
occurring while also being able to detect or identify possible attacks quickly in order to resolve the incident
and greatly reduce the overall impact to the organization. Typical controls for preventing and detecting
ransomware include:
Email protection:
Implementing email protection controls, including email filtering and sandbox, can help prevent
employees from being exposed to phishing attempts to greatly reduce the risk of ransomware being
introduced into the environment.
Patching:
Arguably the most important method of preventing ransomware is by having an established
software patching process and applying software patches in a timely manner to protect your
organization from known exploits.
2 Prevent and enhance (continued)
Endpoint protection:
Endpoint protection controls including antivirus and scripting can help prevent ransomware from
being introduced into the environment while also helping to quickly detect an attack.
minimize the data lost during an attack with multiple recovery points being available. Periodically
testing the availability of the backup ensures an organization is able to effectively use and recover from
the backups.
Multifactor authentication:
Implementing multifactor authentication controls to help protect against the compromise of
passwords for privileged accounts.
Tabletop exercises/simulations:
Routinely perform tabletop exercises or simulations in order to identify key gaps in the plan and
to ensure preparedness of all participants who play a key role in the plan.
Policies:
The organization’s IT policies should outline the requirements for the above control considerations
and should routinely be reviewed and updated.
3 Identify and respond
In case of an attack, the following steps are recommendations in order to help identify, research, resolve,
recover, report, and review an attack, which can be detailed in the recovery plan and made available to
personnel:
Step 1:
Upon identification, immediately escalate to senior management to initiate incident response plan.
Step 2:
Actively research the magnitude and breadth of the incident and take action to stop the spread
of malware in the environment.
Step 3:
Work with legal counsel to determine whether insurance providers need to be contacted, what their
requirements are, and whether they are required to be involved in ransomware negotiations.5
Step 4:
Resolve the incident according to the organization’s plan while being in constant contact with
legal counsel and insurance providers.
Step 5:
Determine appropriate notification to clients based on contractual requirements in
collaboration with legal counsel.
Step 6:
Perform a detailed postmortem review in order to enhance and optimize control framework.
Interesting statistics about Ransomware
Let’s take a look at the latest interesting statistics of Ransomware attacks:
Graph One
The average ransom payment has increased gradually over the years, and interestingly,
hackers tend to duplicate successful attacks and hit the victims repeatedly.
Graph Two
Most companies have experienced data loss and major downtime due to ransomware
victim to your malicious social engineering and lack of training in basic cybersecurity
practices, use of weak passwords, lack of proper access management, and poor
awareness.
Graph Seven
Even the countries with access to the most advanced security technologies with
considerable higher awareness are also falling victims to these kinds of digital extortion.
Graph Eight
Individual users and businesses will continue to be targeted, and URLs embedded in emails
will remain the number one way for computers to become infected.