Here’s a scenario I want you to picture: You’re sitting at your desk, trying to open your company’s financial documents so you can verify some expense was logged correctly. You open up your file navigator (Finder on Macs, File Manager on a PC) and start looking for the file you want. You go to open the file, but you get a warning that the file is encrypted and cannot be opened. Suddenly, a pop-up appears on your screen saying:
“Your files have been locked.
If you want to access them,
send five thousand bucks…”
This message means that your business has become the victim of a ransomware attack, and your data is being held hostage until you pay up. Unfortunately, paying the ransom does not guarantee that the attacker will provide the encryption key you need to access your files again—nor that they won’t simply re-encrypt them later for more money.
While ransomware attacks have been on the decline overall in the last year according to data cited in a report by Malwarebytes, they still remain a significant cybersecurity threat that can cripple a business. In fact, as noted in the Malwarebytes report, “Both January and February were especially low for consumer ransomware detections—specifically, a 35 percent drop. Meanwhile, business detections have increased by 28 percent from the previous quarter.”
The best solution for dealing with this particular cyber threat is to prevent ransomware attacks from happening in the first place—or to apply ransomware protection solutions that can limit the potential impact of a ransomware attack.
With this in mind, here is how to prevent ransomware attacks from damaging your business:
The first thing you need to do to avoid ransomware attacks is to start preparing for them. You never know when an attacker might strike, so it’s better to start making preparations as soon as possible.
Some of the key preparations you need to make include:
When choosing a remote data backup solution, be sure to consider the solution’s recovery time objective (RTO) and recovery point objective (RPO). The recovery time objective is the measure of how long the solution should take to kick in and restore your data—the faster, the better the solution usually is. The recovery point objective is the frequency of the data backup—which affects how much information is lost when you restore your data from the backup. A shorter RPO indicates that the backup occurs more frequently, meaning there’s less data lost when restoring from the backup.
However, not every business needs (or can support the expense of) a remote data backup solution that has RPOs and RTOs measured in mere minutes. When choosing a remote data backup solution, consider how quickly you really need to recover from a ransomware attack and how much data you are likely to lose if your recovery point is measured in minutes, hours, or days.
Businesses with numerous transactions per hour are more likely to need a faster recovery time and more recent recovery point, whereas businesses that use their network more for record-keeping purposes might not need to splurge on such fast and frequent backup solutions.
Also, when estimating your RTO, it’s important to take into account the time it will take to replace or completely reformat the network assets that were compromised with ransomware—simply downloading the data won’t be enough if the ransomware is still on the asset, after all.
For example, say your backup solution had an RTO of 15 minutes to download a complete backup to your network. That 15-minute RTO won’t mean a thing if there isn’t a clean database or production environment to download that data to. To ensure business continuity when fast recovery is a must, it may be necessary to either set up a spare data center that can take over for the primary one if it is hit with ransomware, or to contract a cloud computing service that can provide computing resources on demand.
One strategy for preventing ransomware attacks is to study past attacks—both those against your own organization and those made against others in your industry. Why study attacks made against other organizations? Part of the reason is that it helps you learn about the different types of ransomware that are out there and which ones are the most likely to be leveraged against your organization.
For example, in the Malwarebytes report, there are three primary types of ransomware examined: GandCrab, Scarabey, and Hermes. Some of these threats are actually derivatives of older ransomware threats. According to the report, “Scarab, first discovered in June 2017, returned with yet another variant in December 2018 called Scarabey.” The report noted many similarities, as well as a few differences that may have been intended to make the new threat less recognizable to antimalware programs.
By studying past attacks, you can learn about how they’re carried out—hopefully helping you eliminate the specific vulnerabilities those attacks seek to exploit. This study can also help you learn what a ransomware program can and cannot do. For example, the Scarabey software threatens victims with the deletion of encrypted data over time, but, as noted in the Malwarebytes report: “there’s nothing in the ransomware’s code that would allow this. It’s just a pressure-filled ruse designed to panic victims into paying faster.” Knowing this, you could, if hit with the Scarabey ransomware, be secure in the knowledge that your data won’t be deleted, eliminating the urgency to pay immediately.
One useful tool for studying ransomware attacks against your own organization is security information and event management (SIEM) software. SIEM tools can record information about past attacks, such as origin points, attack types, and other forensic information that can be used to prepare for future attacks. Using SIEM, it’s possible to identify specific gaps in your cybersecurity architecture that may allow a ransomware attack to succeed in the future—helping you close the gaps before an attacker exploits them.
This post has been a little long-winded. So, to sum up the above information, preventing ransomware attacks requires:
Need help preventing ransomware attacks against your organization? Contact us to learn more about security architecture implementation, or download our Cybersecurity Basics guide at the link below: