Search DubaiPRNetwork.com

Dubai and UAE
Home >> Technology

Preventing and Mitigating Ransomware with Cyber Situational Awareness

Saturday, September 23, 2017/ Editor -  

Share

Home >> Technology

By Alastair Paterson, CEO and Co-Founder of Digital Shadows

Dubai, UAE, September 23, 2017:  If you’re familiar with mafia movies then you’re familiar with extortion – the practice of obtaining something, especially money, through force or threats. Extortion has been around for centuries – well before “The Godfather” or “Goodfellas.” Even cyber extortion, which extends this criminal activity into the digital world, isn’t new. What is new, however, is the wide variety of methods that are used by the bad guys to get their money. 

Three main tactics are behind cyber extortion: the threat of distributed denial of service (DDoS), the threat of data compromise and ransomware. DDoS attacks are one of the most popular means to facilitate extortion. These types of attacks typically target business-critical websites in order to increase the likelihood of payment, usually via Bitcoin (BTC), and can have crippling effects on organizations. In certain cases, such as when targeting hosting providers, the threat actor may add more pressure to pay by using the negative publicity associated with service downtime as a threat.

A second method of extortion involves the potential release of compromised data. This method is dependent on the fact that the target’s data has already been compromised. The threat of its release to the public domain is used as blackmail in order to extort money from the affected entity. 

A third type of extortion, and the one most often in the news as of late, is ransomware – malicious software (malware) that restricts access to the computer system it has infected. The malware demands that a ransom be paid before restoring access to affected resources. Ransomware can prevent access to many features of a victim’s machine, including files, applications and the operating system itself. Because ransomware is an ever-evolving threat that can be more challenging to address than other cyber extortion tactics, let’s take a closer look at how it works and how to prevent and mitigate it. 

At a high-level, the ransomware process is fairly standard. Files are encrypted and the attackers, who hold the decryption key, will only allow the target to decrypt the files after the required BTC ransom is paid. Specific details of the attack, however, will depend on the variant.

Until recently ransomware has been delivered most commonly via drive-by-downloads from exploit kits, or through spam emails that either contain malicious attachments or encourage recipients to visit websites hosting malicious content. But we see that starting to change with threat actors using more targeted methods to achieve their objective, such as spear-phishing emails purporting to be from a job applicant or including the name, job title and job-relevant information of the recipient. The disclosure that some organizations are paying the fee to unencrypt data likely provides further motivation for these types of attacks. In fact, when the actor estimates there’s a high likelihood of payment of the ransom fee they invest in more reconnaissance which can further increase the likelihood of infection.

As ransomware becomes big business, research on the dark web reveals a number of services being advertised to make it easy for beginners with low technical understanding to execute ransomware attacks with success. Everything they need is available on a USB stick for $1,200 or they can take advantage of a hosted service in return for 5 percent commission on the ransom payments received.

So how can you combat cyber extortion? Cyber situational awareness can give you greater insights into the tools and processes used by actors that employ DDoS-based extortion and compromised data release extortion. Advanced knowledge of the typical demands of a threat actor and their capabilities can help you make difficult decisions if presented with such a scenario and help you prevent future attacks.

Mitigating ransomware threats is more complex. It requires a combination of technical and process controls and company-wide engagement – from employees, to executives, to IT security teams. Cyber situational awareness can help you understand the infection vectors of the malware and apply the appropriate security controls to mitigate the risk of infection. This includes insights you can use to raise staff awareness of how ransomware attacks occur and help you devise technical and procedural controls to prevent infection and to develop ransomware response procedures in the case of infection. Of course ensuring that backups are maintained and are separate from the network can increase resilience to such attacks. In addition, several decryption tools have been released but, in the cat and mouse game between ransomware and such tools, their effectiveness tends to be short-lived; ransomware developers are continuously developing encryption methods to evade them.

As defenders, staying up-to-date with the latest trends and innovation can be hard, but it is essential in order to effectively prevent and mitigate the effects of extortion on your business. With cyber situational awareness you can learn about the actors involved in extortion and their tactics, tools and motivations. With this knowledge you can more effectively align your defenses and make better decisions in the face of an attack.


Previous in Technology

Next in Technology


Home >> Technology Section

Latest Press Release

MBRU to host Photonics Middle East International Conference – Dubai 2024 from Sa ...

Natuzzi Italia @ Milano Design Week 2024: The Circle Of Harmony – 65th Annivers ...

Ajman Tourism Announces Run Ajman Race at Al Safia Park on 20 April

Ministry of Finance Launches Digital Public Consultation on Potential Implementa ...

Get ready to embark on an unforgettable gastronomical journey at Mercato's Dubai ...

Glam Beaute's Snugberi Launches Exciting New Products to Pamper Your Little Ones

Santoni Presents A Partnership With Patricia Urquiola At The Milan Design Week 2 ...

Superstar Slovenian Tadej Pogaĉar on the hunt for further Monument glory

Tourism leaders from around the world will explore how entrepreneurship and inno ...

Dubai sports council issued a medal to appreciate the first line of defence hero ...

OMODA & JAECOO take global centre stage at Beijing Auto Show 2024

Transform Your Kitchen With Lg's Next-Gen Instaview Oven Designed For The Modern ...

Majid Al Futtaim's 'Feed the Future' Programme Donates 12,000 Meals During Ramad ...

DSMG Wraps Up 2024 Eidiya Campaign with AED 200,000 Cash Prize Bonanza for 22 Wi ...

Kia wins prestigious 2024 Car Design Award for Brand Design Language with ‘Oppo ...

Cleveland Clinic Gastroenterologist Shares Risk-Reduction and Management Strateg ...

The English College Announces Leadership Transition and Reaffirms Commitment to ...

Parmigiani Fleurier – New TORIC Collection

How Not To be Lonely To Be At The Top: The Blueprint for Transformative Leadersh ...

IATA and Partners Release Aviation Net Zero Roadmaps Comparative Review