Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:30 PM
Connect Directly

Heres How To Protect Against A Ransomware Attack

Recovering data encrypted by a ransomware attack is next to impossible, so prevention offers the better approach.

Ransomware attacks -- where online extortionists encrypt data on a victim’s computer and then demand a fee for unlocking it -- started off mainly as a consumer problem but increasingly is hitting businesses and government entities as well.

The trend has significantly heightened the need for organizations to have measures in place for blocking the threat and for mitigating damage to the extent possible. Most security experts agree that it is almost impossible to recover data that might have been encrypted in a ransomware attack without access to the decryption keys, or to a backup copy of the affected data.  

So the focus has to be on prevention.

“[Ransomware] is evil because if implemented correctly by the attackers … it is very difficult to recover the data on the machine,” says Engin Kirda, co-founder and chief architect at security vendor Lastline. “The key difference of this type of malware compared to traditional malware is that you often know that you have been infected because the malware tells you this."

Having a robust data backup process can go a long way in blunting the threat posed by ransomware. In fact, it is often the only way to recover data if you are unwilling to pay the ransom demanded by an extortionist. But there are other measures that organizations can take as well, including the following:

Authenticate In-Bound Email

Email is a commonly used method to distribute ransomware. Attackers target victims with cleverly spoofed emails that appear to originate from someone the victim knows. The emails have malicious attachments which when opened results in the ransomware being downloaded on the victim’s system.

One of the most effective ways for an organization to blunt this threat is to validate the origin of an email before it is delivered to the intended recipient, says Craig Spiezle, executive director and president of the Online Trust Alliance (OTA).

Implementing sender identity technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) can all protect organizations against spear phishing, business email compromise, and other threats posed by spoofed email, Spiezle says. They work by validating the IP address and domain of the server from which an email originates.

“Unfortunately, most corporations are not authenticating inbound mail,” Spiezle says. And when they do, the policies are not strong enough. For example, emails that fail authentication tests are often simply quarantined or sent to a junk folder.  Instead, “corporations that have sensitive information should have a reject policy for email that fail,” authentication tests, he says.

Protect Your Email Servers

Sender authentication can mitigate the risk of ransomware being delivered via email. But that alone is not sufficient, says Craig Young, security researcher at Tripwire. If you haven’t done so already, protect mail servers by scanning all stored, incoming, and outgoing mail. Such scanning can help organizations detect threats that might have evaded perimeter defenses or infiltrated the network via compromised systems and internal email. Numerous tools are available for scanning email servers for security threats. Take advantage of them, he says.

“Email authentication is a good measure to have,” Young says. “But there’s always a chance that a legitimate email server is used to send out spam emails,” and other malware, he says.

Add Ad Blocking

In addition to emails, attackers often distribute ransomware through malicious advertisements served up to users when they visit certain sites. Malvertisements allow attackers to target victims based on their browsing habits, location, demographic information, device characteristics, and other criteria. Ransomware served up via watering-hole attacks often tend to be more dangerous than random attacks because they are targeted at victims which the attackers know have the capability to pay up.

Blocking ads from being delivered on user systems or preventing users from accessing certain sites can diminish this risk somewhat, Spiezle says. Organizations that want to accommodate unrestricted access to the Internet for employees might consider implementing a separate network for them to do so, he says, pointing to one government contractor that has taken this approach.

Monitor File Activity 

With ransomware, an attack against an individual can quickly escalate into an attack against the enterprise, says Amichai Shulman, chief technology officer at Imperva. Many ransomware tools have the ability to encrypt not just the hard drive of a system, but also any shared files.

In fact, rapid file overwriting is one of the clearest markers of ransomware on your network, he says. So using a tool to monitor file activity is a good idea, says Shulman, whose company sells an activity-monitoring tool.

“If you are constantly monitoring access to file servers, there are very distinctive patterns that you can look for in order to detect ransomware,” on an endpoint, he says.

Such early detection can help organizations contain the damage that a ransomware tool can wreak, he says. “The advantage is that you can go quickly into quarantine mode for the infected machine and make sure it doesn’t connect to any other file server,” in the enterprise.

Keep Your Response Plan Handy

Time is critical for an organization faced with a ransomware deadline. Online extortionists typically give organizations a very specific time limit within which to pay -- fter which they sharply increase the ransom amount. Attackers have gotten increasingly better at knowing what an organization can afford and knowing exactly when to strike, Spiezle says. They deliberately don’t give enough time for an organization to figure out if it can try and unlock the data without paying any ransom.

So it is important to have a plan in place describing what needs to happen in the event of a ransomware attack. Do an inventory of your critical data assets, know where it is located, and evaluate that impact of any loss or unavailability of that data.

 “One of the worst things is the chaos that ensues during an incident like this. Emotions run high, people don’t have the answers and they are scrambling,” to respond. he says. “The last thing you want is to be doing a Google search for a local forensics experts at 2am on a Saturday morning.” 

Related Content:

Interop 2016 Las VegasFind out more at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
User Rank: Ninja
2/9/2016 | 12:53:45 PM
Because ransomware is capable of attacking both local and remote backups, the best line of defense is a proper retention policy of encrypted backups. I suggest a minimum of 2 weeks.

Since the backups are already encrypted, they are simply not vulnerable. No matter what method of attack is used. The ransomware will not have access to these files to apply it's own encryption algorithm.

Also, as far as I know the method of attack utilized is soley by file extension. Ransomware is not yet capable of anylizing mime type file headers. That being said, renaming the extension of a known file type such as a word document (ie .docx) to something completely obscure (ie .zyx612), followed by changing the new file type association to open with MS Word will result in the file indexing of the ransomware to bypass encryption of the unrecognized extension.
User Rank: Apprentice
5/16/2016 | 9:44:20 PM
New Strain are Smarter than just targeted common file extensions! Your backup needs to be secured!
Apart from all the other Ransomware Protection best practice 101 guides.....


First of all just because you are encrypting your backups doesn't mean a ransomware cannot re-encrypt it. We've had a few cases where all clients had their encrypted backups targeted and damaged by ransomware! Your best defence to safe guard your backups:

1. Permissions - Remove all default file & folder permissions on the repository folder. Specifically add a single backup user permission. eg. create a user "repobackup" with read & write. Deny group administrators to this folder and other groups & users.

Configure your backup software to specifically use the repobackup user to do it's business.

Any access to this folder except for the user repobackup will be denied. So all attempts of the ransomware to find it on the network (including accessing hidden shared drives, c$, d$,etc etc) will be denied access to it once it hits your repofolder.

(even ransomware as they wont have permission to it.)

2. Sftp/scp -  some backup software have modules that will allow for remote replication via SFTP/SCP. You should make use of them.


Secondly, you shouldn't rely on simply tricking "ransomware" with renaming your files. We've had two cases of modified ransomware (well they should call it "ransom DAMAGEWARE") that had absolutely no intention of giving victims their data and allowed for * file extension.



OPTION if it is available to you.


Explore the software from "Cylance" for your unconventional Security Suite. So far clients that chose to implement it (following previous attacks), have been miraculously somewhat protected. Even with the new strains such as when Locky started to appear, it has seemed to have innoculated it.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/25/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Malware Attacks Declined But Became More Evasive in Q2
Jai Vijayan, Contributing Writer,  9/24/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-29
In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
PUBLISHED: 2020-09-29
IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
PUBLISHED: 2020-09-29
An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...