Detect and Defend Against Ransomware

maktub-lockerEncryption ransomware can be a devastating event if it happens to your or your company.  The three solutions are basically pay the money, restore from backup, or accept your losses and move on.  All are expensive, and some can be severe enough to drive a business out-of-business.Monday we gave you several ways to prevent, or at least prepare a response to a crypto-ransomware exploit.  Today we are going to look at early detection and defensive tactics.

According to a recent paper from Palo Alto Networks, the three main methods of deployment are email attachments, email links, and exploit kits.  Regarding email, we have discussed at length in previous articles the importance of employee cybersecurity awareness training in defending the Inbox from email-borne exploits.  Additional methods to reduce or eliminate email exploits would be:

  • Better email filtering – get a spam firewall if you don’t have one or set one up through a cloud provider.
  • IDS, IDS, or Unified Security Management (USM) solutions – AlienVault is a solution we are currently recommending for businesses that are getting serious about exploit detection and prevention.  This sort of a solution will see the encryption activity early in the process and alert the IT or security staff to the issue.
  • Block ZIP files – since some many exploits use the ZIP format for attaching files, blocking them at the email gateway would eliminate this problem.  For those who are dependent on email for file sharing, there are many online resources (DropBox, OneDrive, Google Drive) for sharing these files in a way that is more secure and easy to verify.
  • Block VB Macros – Exploits are showing up again in Word, Excel and other office attachments.  Macros are blocked by default, but using Group Policy to prevent an end-user from enabling them at all would block this attack.

Exploit kits are different.  Exploit kits are sophisticated tool-kits that exploit operating system and software vulnerabilities. These tool-kits can be specifically recreated for the job and intended target using something such as Metasploit, or they can be purchased as a turnkey service on the Dark Web.  Usually exploit kits are executed when a victim visits a compromised but legitimate website, or through typographical errors, sometimes a malicious replica site with a close misspelling.  Malicious software hidden on the site, often in an advertisement or malvertisement redirects you to the exploit kit landing page unnoticed. If your system is vulnerable, a download of a malicious program will be installed and the encryption of important files begins.  Here are some good ways to defend again these:

  • Application control systems will prevent any software from installing unless it has been previously approved for use in the corporation.  In addition to blocking ransomware, this defeats almost all other malware installations, as well as games and non-business applications that sometimes users install without permission.
  • Patches and updates – when you patch, you usually fix a security hole that will block one or more exploits kits from working on your system.  Patch on a tight schedule. Waiting 90 days to update so you can “test” means the bad guys have 90 days to break in.  (Are you really testing or just delaying?)

Friday we will look at recovery options for crypto-ransomware infections.  We have stated that once you are encrypted there is no way back, but this is technically not always true.  Find out more in our next post.

 

0

About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment


This site uses Akismet to reduce spam. Learn how your comment data is processed.