Jack O'Sullivan
November 24 2020
It is from the category of software collectively called malware because it is designed with malicious intent. Ransomware is a lesser known malware when compared to other forms such as: a virus, a trojan horse or a worm.
Consensus says the first appearance of ransomware dates to 1989 (the so-called AIDS Trojan). Despite being over quarter of a century old, the prevalence of ransomware is only being established now. It is an increasing threat precisely because attackers can make money directly through it. Criminals are increasingly behaving like businessmen, they like a good return on investment too.
While ransomware is commonly described as a specific form of malware on its own. Secarma contest that it is simply a payload. This is true because a virus, trojan horse, or worm are all simply separate ways of getting onto or spreading between computers.
To relate this to the real world think of ransomware as the payload for a missile. The missile gets the payload to its destination but the payload does the damage.
The following summarises the two most common routes used to put ransomware onto a computer:
If the exploit is in a networked service which is available on the Internet then it can be exploited automatically by a computer program without human interaction. When true there is a risk of a worm style of malware. A worm would infect one computer, and then use that computer to scan for additional nodes to infect. This is the mode that the now famous WannaCry ransomware attack took in May 2017. It is a highly effective way to spread an infection to maximise impact.
When the exploit targets humans then it has a higher success rate when it is tailored. If the attacker crafts a plausible story and then targets the correct individuals they would have a higher strike rate. However, the old saying “if you don’t buy a ticket you won’t win the lottery” holds true when conducting a phishing exercise. The attacker may only need one user within an organisation to interact with the payload externally. If controls are not in place infecting one workstation may spread to the rest of the network. In those circumstances sending thousands of emails and getting one victim is enough.
So far, this article has covered broadly what ransomware is and how it gets onto computers. By now you understand it will try to extort the victim. But how does it go about doing so? To explain this let’s list the atypical behaviour of ransomware once it has executed on the victim’s computer:
Ransomware makes money for criminals. It works by preventing a user accessing their files. A home user may cherish the photographs of their children or holidays. The business user would need those documents to deliver on-time to their expectant customers. Either way they have lost something that they own and it is theft in the truest sense.
As with all theft the victim will feel panic and have the desire to recover what is theirs. No matter how the ransomware has been delivered the criminal is relying on exploiting this human emotion to make money.
The most effective time to act to ensure you minimise the risks of ransomware is before it finds you. By acting ahead of time, you will be less likely to get infected and you should have a plan in place for what to do if the worst happens. The following steps can be taken proactively. Some need to be done by you alone while others should likely be outsourced.
Steps you can take:
1. Create and enforce a complete software patching policy
2. Ensure that all computers are protected by an anti-virus solution
3. Create a backup plan
4. Consider taking out Cyber Insurance that reimburses you for lost data and time
5.Develop your response plan.
1. Conduct a penetration test of your externally facing Internet ranges.
2. Provide staff with security awareness training
3. Simulate a “phishing” exercise to gain metrics around the likely effectiveness of this technique against your staff.
4. Undertake a configuration review of your standard workstation and/or server builds.
Review all routes from at least the user LAN to the Internet:
The worst has happened and you have been hit by a ransomware attack. What should you do? If you have followed all the proactive steps the answer is simply:
If you have not planned then you will no doubt be worried and still want answers. For illustration purposes a generic plan would be like this:
We believe that the security of your critical networks and data is key to your organisation’s success. Whatever your sector, whatever your size, our mission is to help you to seize the competitive advantages of providing your clients with security, compliance, and reliability.
Want to know more about ransomware and how to protect your organisation from other malicious attacks? Contact a member of our dedicated team today - we're more than happy to help.