Protecting Your Business - Ransomware Prevention and Recovery Best Practices
Ransomware attacks have emerged as one of the most significant cybersecurity threats to organisations worldwide, particularly financial institutions, creating substantial challenges for data security and business continuity.
These attacks have become a major cybersecurity threat globally. They exploit vulnerabilities in hospital, medical, aviation, Telecoms, financial, and professional services systems and networks.
Lets pick out some key points, according to a 2023 report from Sophos "The State of Ransomware":
- 76% of those who experienced a ransomware event said that, during the most significant attack, the cybercriminals involved successfully encrypted their data.
- 46% paid the ransom to regain access to their data. However, even after payment, only an average of 63% of the encrypted data was successfully restored.
- 30% of ransomware attacks where data was encrypted reported that data was also stolen.
- Emails were the root cause of 30% (approx.) of attacks; 18% started with a malicious email and 13% with phishing.
- The mean recovery cost from a ransomware attack:
- $1.82 million - excluding ransomware payment.
- $2.6 million if paid and got data back
- $1.6 million - costs drop if successfully restoring from backups can be achieved as the primary means of recovery.
As you can see, in today's digital landscape, ransomware attacks continue to pose a significant threat to businesses of all sizes. These malicious attacks encrypt critical data, rendering it inaccessible until a ransom is paid.
To safeguard your organization against such threats and ensure quick recovery in the case of an attack, it's crucial to implement robust prevention and recovery measures.
Lets Breakdown a 'Ransomware' Attack
(... at a high-level)
So before we talk about protecting your business from ransomware and recovery best practices, let's first break down a ransomware attack. We'll use a well-known ransomware and explore how the attack unfolded.
Ransomware: WannaCry
WannaCry was the first ransomware to exploit the EternalBlue flaw in Windows systems. You can find further info about WannaCry from the US CISA & UK NCSC.
Note: Yes, WannaCry is a good few years old now, given that it happened in 2017; however, it is still one of the most prominent attacks on organizations around the globe and caught many organizations who thought they were prepared but weren't.
The U.K.'s National Health Service (NHS) was one of the most prominent WannaCry victims. Multiple hospitals, general practitioners, and pharmacies were affected in England and Scotland. NHS facilities were forced to delay and divert medical services.
Financial Losses: £92 million (approximately $100 million) according to the National Health Executive:
- £20m was lost during the attack mainly due to lost output.
- Followed by a further £72m from the IT support to restore data and systems.
- Impact: Approx. 19,000 appointments were cancelled across the one week of the attack.
This was coupled with 24-hour news coverage about the attack on the NHS, leading to patient panic, loss of faith in the service, and damage to the NHS brand itself.
Attack Breakdown
The Key Points:
- WannaCry exploits a vulnerability in Microsoft's SMBv1 network resource-sharing protocol.
- The exploit let the threat actors (TA) transmit crafted packets to any system that accepted data from the public internet on port 445.
- SMBv1 is a deprecated network protocol.
- SMB Should not be exposed to the internet.
- WannaCry appears on computers as a dropper.
- This is a small helper program that delivers and installs malware.
- Components in the dropper include:
- An application for data encryption and decryption.
- Files of encryption keys.
- A copy of Tor for command-and-control communications.
- Components in the dropper include:
- This is a small helper program that delivers and installs malware.
- WannaCry used, at the time, a 0day exploit known as 'EternalBlue' to spread.
- TA first step: search the target network for devices accepting traffic on TCP port 445, indicating the system is configured to run SMB.
- TA then initiate an SMBv1 connection to the device.
- Once a connection is made, a buffer overflow is used to take control of the targeted system and install the ransomware component of the attack.
- Once a system is affected, the WannaCry worm propagates itself and infects other unpatched devices.
- All without any human interaction.
- WannaCry encrypts files on the hard drives of Windows devices so users can't access them.
- Ransom payment demanded.
- A significant flaw was noted with the release of decryption keys:
- The TA didn't have any way to prove who paid the ransom, resulting in a completely manual process of attribution from the TA to attribute the decryption keys to the correct person/org who had paid.
- A significant flaw was noted with the release of decryption keys:
Attack Diagram:
Attack Breakdown Summary
WannaCry ransomware leverages vulnerabilities in Microsoft's SMBv1 network protocol to propagate across networks and encrypt files on Windows devices, demanding ransom payments for decryption.
The attack spreads via crafted packets sent to systems exposed to the Internet on port 445, exploiting a buffer overflow to install the ransomware component. Once infected, WannaCry autonomously propagates across unpatched devices, encrypting files without user interaction.
When we look at this, the UK's NHS, for instance, would have benefited from the following points, which would have ultimately aided in the prevention and/or more efficient recovery from such an attack:
Network Segmentation:
- Segment networks to prevent SMB traffic exposure to the internet, limiting access to internal systems only.
- Use firewalls and network security measures to restrict traffic on port 445 and other vulnerable ports.
Vulnerability & Patch Management:
- Regularly update and patch systems to address known vulnerabilities.
- Implement a robust vulnerability & patch management program to ensure timely updates across all devices.
Disable SMBv1:
- Disable SMBv1 protocol on all devices, as it is deprecated and prone to exploitation.
- SMBv2 or SMBv3 protocols are used, which offer improved security features.
Endpoint Security:
- Deploy endpoint protection solutions with ransomware detection and prevention capabilities to detect and mitigate ransomware attacks at the endpoint level.
- Enable behaviour-based detection to identify and block suspicious activities indicative of ransomware behaviour.
Backup and Recovery:
- Maintain regular backups of critical data stored offline or in secure, isolated environments.
- Test backup restoration procedures regularly to ensure data can be recovered without paying the ransom in the event of a ransomware attack.
The Impact of Ransomware Attacks
The impact of ransomware attacks on any organisation, though in particular financial and healthcare institutions, can be and is far-reaching, resulting in severe consequences (as discussed briefly in the section above, where the impact on the UK's NHS was highlighted).
Financial Losses
Ransomware attacks can result in substantial financial losses for any affected organisation, particularly financial institutions. Paying the ransom demanded by attackers is often costly and provides no guarantee of recovering the encrypted data. The costs of investigating the attack, restoring systems, and implementing enhanced security measures can also be significant.
Regulatory Penalties
Financial institutions in particular are subject to strict data protection and security regulations. In a ransomware attack leading to a data breach, regulators may impose severe penalties and fines for non-compliance. Moreover, reputational damage caused by non-compliance can further erode customer trust and investor confidence.
Loss of Customer Trust / Reputation Damage
Customers entrust organizations like professional services and financial institutions with sensitive financial data and personal information. A successful ransomware attack compromising this data can lose customer trust and loyalty and damage the brand irreparably. Customers may lose confidence in the compromised organizations' ability to protect their data, leading to potential client/customer attrition.
Operational Disruption
Ransomware attacks can cause significant operational disruption for any organization, though in particular, financial institutions. Encrypting critical systems and data can render them inaccessible, resulting in delays and disruptions in financial transactions, customer services, and other essential operations. This can lead to a loss of productivity, decreased customer satisfaction, and potential financial losses.
Legal Costs
Ransomware attacks can also lead to legal consequences and associated costs for the effective organization. When client/customer data is compromised, affected individuals may take legal recourse for negligence in protecting their information. Legal fees, settlements, and potential damages can add to the financial impact of the attack.
Loss of Intellectual Property
In addition to customer data, ransomware attacks can also result in the theft or loss of valuable intellectual property. Many business and financial institutions may have proprietary software, algorithms, trading strategies, or other sensitive information that, if compromised, can lead to significant competitive disadvantages and financial losses.
Disruption in Supply Chain
Ransomware attacks targeting key organisations and financial institutions can also have ripple effects on their supply chain partners. Suppose threat actors gain access to these systems and use them as a launchpad for further attacks. In that case, it can impact other organizations connected to the compromised company, leading to a wider business and financial ecosystem disruption.
Increased Insurance Premiums
Following a ransomware attack, organizations and financial institutions may experience an increase in their cyber insurance premiums (if applicable). Insurance companies may reassess the organization's risk profile and adjust premiums accordingly, adding to the financial burden and outlay.
Ten Best Practices to Aid Your Recovery Strategy
With all of the above in mind, here are ten best practices to consider which will aid your disaster recovery strategy and offset your threat model for ransomware:
-
Backup Data: Regularly backup all important data and ensure that backups are stored securely offsite or in the cloud. This ensures that even if your primary data is compromised, you can restore it from a secure backup. Ideally multiple instances of sensitive data should exist, providing redundancy, should your data and primary back up data be successfully targeted.
-
User Training: Educate employees about the risks of ransomware and social engineering attack vectors and provide training on how to identify phishing attempts and suspicious links or attachments.
-
Email Filtering: Implement robust email filtering solutions to block malicious emails and prevent phishing attempts from reaching employees' inboxes.
-
Vulnerability & Patching Management: Keep all software, operating systems, and applications up to date with the latest security patches to address known vulnerabilities.
-
Network Security: Utilize firewalls, intrusion detection systems, and other network security measures to protect against unauthorized access and malware infiltration.
-
Incident Response Plan: Develop a comprehensive incident response plan outlining steps to take in the event of a ransomware attack, including who to contact and how to contain the damage.
-
Multi-Factor Authentication: Implement multi-factor authentication (MFA) wherever possible to add an extra layer of security to user accounts and systems.
-
Regular Testing: Conduct regular testing and simulations of ransomware scenarios to evaluate the effectiveness of your prevention and recovery measures.
-
Isolation: Segment your network and restrict access to critical systems to minimize the impact of a ransomware infection and prevent it from spreading across the entire network.
-
Data Recovery: Establish procedures and tools for quickly recovering encrypted data from backups in the event of a ransomware attack, minimizing downtime and business disruption.
By implementing these best practices, businesses can significantly reduce their risk of being victims of ransomware attacks and mitigate the impact if one does occur.
In Summary ...
Remember, prevention is key, but having a robust recovery plan is equally essential to ensure business continuity in the face of cyber threats. Stay vigilant, stay prepared, and keep your business safe from ransomware.
In general, organizations should aim to focus on the following key areas:
- Robust vulnerability management (VM) program. Vulnerability management is a continuous, proactive, and often automated process that keeps your computer systems, networks, and enterprise applications safe from cyberattacks, such as ransomware and data breaches. The goal of VM is to reduce the organization's overall risk exposure by mitigating as many vulnerabilities as possible.
- Maintaining good security hygiene, including timely patching and regularly reviewing security tool configurations
- Security tooling, people and processes that defend against the most common attack vectors, including endpoint detection, protection and response.
- 24/7 threat detection, investigation, and response, e.g., a security operation centre (SOC) whether delivered in-house or in partnership with a specialist Managed Detection and Response (MDR) service provider.
- Disaster response (DR) preparation and optimization, including making regular backups, practising recovering data from backups, and maintaining an up-to-date incident response plan
How can we help?
Here at Lares, we help empower organizations to maximize their security Potential.
Lares is a security consulting firm that helps companies secure electronic, physical, intellectual, and financial assets through a unique blend of assessment, testing, and coaching.
If you would like any further information, you can get in touch here or head over to the Lares.com website for more information about how we can help you and the things that matter to you.