{"id":36748,"date":"2022-05-30T16:14:09","date_gmt":"2022-05-30T05:14:09","guid":{"rendered":"https:\/\/www.institutedata.com\/?p=36748"},"modified":"2022-05-30T16:15:32","modified_gmt":"2022-05-30T05:15:32","slug":"a-guide-to-ransomware-what-do-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.institutedata.com\/us\/blog\/a-guide-to-ransomware-what-do-you-need-to-know\/","title":{"rendered":"A Guide to Ransomware: What do you need to know?"},"content":{"rendered":"<p><strong>By Ez Yiap<\/strong><\/p>\n<p><strong>Cyber Security Consultant (GRC) and Assistant Trainer for the Institute of Data\u2019s Cyber Security Program.<\/strong><\/p>\n<p><strong>An IOD alumni who pivoted into cyber security, Ez now helps organisations assess and strengthen holistic cyber security. Ez is passionate about contribution and coaching within the cyber security community.\u00a0<a href=\"https:\/\/www.linkedin.com\/in\/ez-yiap\/\" target=\"_blank\" rel=\"noopener\">Connect with Ez on LinkedIn here<\/a>!<\/strong><\/p>\n<hr \/>\n<p><span data-preserver-spaces=\"true\">Ransomware is a form of malicious software (malware) that is distributed and\/or deployed by a threat actor (malicious person, hacker, cybercrime group). Ransomware is intended to disrupt system operations, deny access to files, services or possibly the entire device, and place timebound pressure to take corrective action. While it can impact individuals, average home users or households, it is usually targeted at organizations, being a primarily financially motivated attack.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Who uses ransomware, and who do they target?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Usually, a cybercriminal organization or entity leverages ransomware to encrypt files on an organization\u2019s device(s), denying access to staff or customers, and sometimes even both. In most scenarios, the threat actor holds the decryption algorithm program and demands a ransom be paid by the organization in order to decrypt the files\/system within a specified timeframe so the organization can regain control and return to operations.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">How does a ransomware attack start?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">As with most cyber-attacks, ransomware can impact a device through different vectors. It could be an email attachment activated by an unaware user or in a download unbeknownst to the user. Additionally, ransomware may be deployed by a threat actor following the compromise of a network environment, gaining access to systems and applications via phishing for credentials, or the use of social engineering to gain initial access before deployment.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Sometimes it is as simple as tricking a user into being directed to a malicious website where the malware download occurs. Ransomware can even be placed on external media, such as a USB drive and when plugged into a computer, infects the device.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ransomware as a Service (RaaS) is a criminal business model whereby one entity (affiliate) pays another (operator) to launch a ransomware attack against a specified target. This allows almost anyone the capability to instigate an attack without necessarily having developed ransomware software or having deep technical know-how to undertake the engagement. CrowdStrike, via its Cybersecurity 101 channel, advises\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/ransomware\/ransomware-as-a-service-raas\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">RaaS can start from as low as USD$40 per month<\/span><\/a><span data-preserver-spaces=\"true\">, and the average criminal ransom demand in 2021 was USD$6 million.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Have you heard about the rise in ransomware \u2018double-dipping\u2019?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Ransomware attacks are often associated with data breaches, whereby the threat actor exfiltrates sensitive data before encrypting the devices or systems. This rising cybercrime trend is known as \u2018double-dipping\u2019. In addition to the denial of access, the threat actor holds the organization to an additional ransom at the threat of releasing the data extracted to the dark web, public, or selling it to other cybercriminals.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">There is, of course, never any guarantee that if a ransom is paid, the threat actor will provide decryption, return any stolen data or not take other cybercriminal action. Many organizations that have paid a ransom often still have the exfiltrated data leaked regardless.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Why should we be concerned about ransomware?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Understandably, ransomware tops the list of many organizations\u2019 worries when it comes to an ever-evolving threat landscape. Risks come in all forms; economic, weather, organizational, geopolitical, market, human, technology and more; however, they are not always considered, assessed and treated equally. As a result, cyber risk is challenging for many organizations.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">It often requires the considerations, resources and attention traditionally excluded from business inception, being sought after or implemented in later maturity stages as the organization grows. Additionally, given the proliferation of ransomware is relatively recent, many established organizations have not known about it or how to mitigate against it or respond when impacted.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ransomware is feared because of the debilitating way it can cripple an organization effectively and efficiently. IT can often occur so quickly, and the resulting impact is critical. There can be drastic ripple effects on supply chains, the community, and even the health and well-being of people.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">CrowdStrike, in its 2022 Global Threat Report, observed that in 2021,\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.crowdstrike.com\/resources\/reports\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">ransomware-related data leaks increased by 82%<\/span><\/a><span data-preserver-spaces=\"true\">, with the total number of attacks at 2,686 by the year\u2019s end compared to 1,474 during 2020.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">What is the solution to protecting against ransomware attacks?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">There are plenty of dedicated technology solutions that claim anti-ransomware capabilities. Additionally, there are longstanding anti-virus and anti-malware packages that continue to extend protection tools into anti-ransomware offerings.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Finally, some companies or individuals put vulnerability management at the top of the mitigation stack. Others may say doing daily backups or even prioritizing taking out cyber insurance can be a way to safeguard you.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ultimately, preventing, detecting, responding to and recovering from ransomware, as across cyber security as a whole, requires a holistic approach of people, processes and technology controls. Let\u2019s look at these in-depth a bit further.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">What part do people play in protecting against ransomware?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">People are arguably the leading cause of ransomware attacks being successful, but just the same people can be an organization\u2019s greatest proactive defense against it.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ransomware has to be delivered and deployed to a device for it to take effect and encrypt data, locking out user(s). For a threat actor to deliver and deploy the ransomware, they need to breach the organization\u2019s device, network or environment by some means.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ransomware attacks often start with obtaining a user\u2019s credentials through a means of social engineering such as email phishing, vishing (like phishing but on a voice call) or by sending a user an email with a malicious attachment. Sophisticated ransomware attacks leveraging a user may involve social media connections, spam, impersonation, direct messages or even app store downloads to mobile devices.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">The\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.cyber.gov.au\/ransomware\/protect-yourself-against-ransomware-attacks\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">Australian Cyber Security Centre (ACSC)<\/span><\/a><span data-preserver-spaces=\"true\">\u00a0lists three cautions that users can take and be trained on:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Visiting unsafe or suspicious websites<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Opening emails or files from unknown sources<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Clicking on malicious links in an email or via social media<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">Embedding a workplace culture of security awareness is essential to ensure that staff operate day-to-day tasks with a heightened sense of awareness.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Verifying before trusting is a key concept for users to learn about. By implementing a mindset of risk assessment with all communications and interactions, staff will be more likely to verify the validity of email sources, attachments, requests, messages, calls, etc.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">What are some of the essential processes for ransomware incident readiness and response?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Organizations need policies addressing ransomware and other security-related incidents. Additionally, processes and procedures are required in order to build out tactical and operational direction. Staff need to know what steps to take in order to identify a ransomware incident, how to contain it, who to speak to about it, what other impacts may result from the ransomware and how to treat it.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">To promote an organization\u2019s cyber maturity growth, processes need to address lessons learned, such as a formal and documented incident review, revision and coaching process. Organizations can utilize procedures to empower staff to feel ready to deal with a ransomware incident and then recover and better prepare for future incidents.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">As ransomware is often a security incident that requires multiple stakeholders, both internally and externally, and may require contact with government and law enforcement bodies as well as regulators and insurers, there is a multitude of moving parts.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Communication and how to effectively and timely notify the proper entities is crucial. Processes should be developed, tested, reviewed, updated and treated as living documents made aware to all relevant parties.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">What technology controls prevent, mitigate and treat ransomware risks?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Other than leveraging people as a vector to deploy a ransomware attack, threat actors will look to take advantage of technical vulnerabilities in software, applications, websites, network infrastructure and end-user devices.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Therefore, mitigating the threat of ransomware requires addressing multiple layers of technology. Some of the top mitigations are as follows:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Maintain a formal, documented vulnerability and patch management program. This should include the identification of severity ratings for vulnerabilities and the required timeframe that these must be addressed and patched by the organization. For such a program to be effective, a detailed, comprehensive and complete asset register is required to ensure that no asset \u2013 whether device, operating system or application \u2013 goes unchecked for the most up-to-date security patching.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Patch management \u2013 updates \u2013 should be centrally managed for all user devices where possible, including Bring Your Own Devices (BYOD), mobiles, laptops, and all other network and infrastructure technology.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Utilize multi-factor authentication (MFA). MFA addresses several security controls across a few domains. As an access control, MFA can be used to prevent a compromised user\u2019s account from being leveraged as a vector to the device or environment and work as an effective flag raised as to the possibility of a security event attempted or underway.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Backups are an age-old challenge that many organizations continue to fight. Increasingly, this challenge arises in organizations undertaking cloud migrations or having legacy systems in production that limit timely, effective, and affordable controls. Avoiding having to pay a ransom can often be addressed by restoring a device, system, network or environment through the restoration of backups. However, if the organization\u2019s policies and procedures do not address regular backups, including testing backups to ensure availability, integrity, and, importantly, segregation from all other parts of the network, they may not be effective.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ransomware protection technology is available through several software bundles, applications or solutions. Windows Defender in Windows 10, for example, has some capability to provide ransomware protection. Other end-point detection and response (EDR) or next-generation EDR solutions, sometimes known as XDR, are able to provide intrusion detection\/prevention responses and take actions to mitigate threats when suspicious traffic, files or events are encountered.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">For an individual or organization to have an assurance of readiness to respond to ransomware attacks, people, processes and technology controls must be fully implemented, tested, reviewed and updated routinely to keep up with the changing threatscape.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">So, what\u2019s the best approach?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">When it comes to paying a ransom, most organizations have to assess the impact and cost of paying the ransom versus the impact and cost of being taken offline or unable to do business for a period of time. In some instances, paying a ransom may be deemed as contributing to or being an instrument of crime.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">For example, in some parts of the world, sanctions apply for the support of advanced threat persistent (ATP) groups or terrorists that may use ransomware for funding their activities and criminal organizations.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Organizations and individuals should always consider legal advice as part of undertaking their ransomware policies, processes, response readiness and incident management.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Cyber insurance companies are increasingly reluctant to honor claims related to ransomware. They may ask in some circumstances that a level of maturity in cyber security controls be implemented within the organization to be eligible for a claim to be lodged and honored.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Organizations such as the ACSC and numerous technology vendors provide free resources that can be used to start the journey for organizations to identify risks potentially leading to a ransomware attack. A great starting point for organizations is to undertake a risk assessment for a baseline on what the opportunities are for improvement.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">From there, they can develop a strategy to implement controls and mitigations. There is no one solution, fix-it-all for ransomware, so organizations\u2019 leadership must understand that it is a holistic approach to be most effective.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Fighting ransomware is each and everyone\u2019s responsibility in the current threatscape. Keep in mind that people, processes and technology are all required as a holistic approach.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Exciting, challenging and rewarding career prospects exist and continue to boom in each of these aspects to address to protect and secure individuals, communities and organizations against ransomware.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">If you are thinking of stepping into a role in the fight against ransomware and protecting organizations, individuals, communities, and even countries, you should look at the skills required to equip yourself as a cyber security expert.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">By\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/www.institutedata.com\/courses\/cyber-security-program\/\" target=\"_blank\" rel=\"noopener\"><span data-preserver-spaces=\"true\">joining the Institute of Data\u2019s Cyber Security Program<\/span><\/a><span data-preserver-spaces=\"true\">, you will obtain job-ready skills and industry connections that could get you one step closer to becoming an integral part of the ransomware solution.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Ez Yiap Cyber Security Consultant (GRC) and Assistant Trainer for the Institute of Data\u2019s Cyber Security Program. An IOD alumni who pivoted into cyber security, Ez now helps organisations assess and strengthen holistic cyber security. Ez is passionate about contribution and coaching within the cyber security community.\u00a0Connect with Ez on LinkedIn here! Ransomware is&hellip;<\/p>\n","protected":false},"author":1,"featured_media":36664,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[528,529],"tags":[],"class_list":["post-36748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-cybersecuritytechnology"],"_links":{"self":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/36748","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/comments?post=36748"}],"version-history":[{"count":0,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/posts\/36748\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media\/36664"}],"wp:attachment":[{"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/media?parent=36748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/categories?post=36748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.institutedata.com\/us\/wp-json\/wp\/v2\/tags?post=36748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}