Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:30 PM
Connect Directly

Heres How To Protect Against A Ransomware Attack

Recovering data encrypted by a ransomware attack is next to impossible, so prevention offers the better approach.

Ransomware attacks -- where online extortionists encrypt data on a victim’s computer and then demand a fee for unlocking it -- started off mainly as a consumer problem but increasingly is hitting businesses and government entities as well.

The trend has significantly heightened the need for organizations to have measures in place for blocking the threat and for mitigating damage to the extent possible. Most security experts agree that it is almost impossible to recover data that might have been encrypted in a ransomware attack without access to the decryption keys, or to a backup copy of the affected data.  

So the focus has to be on prevention.

“[Ransomware] is evil because if implemented correctly by the attackers … it is very difficult to recover the data on the machine,” says Engin Kirda, co-founder and chief architect at security vendor Lastline. “The key difference of this type of malware compared to traditional malware is that you often know that you have been infected because the malware tells you this."

Having a robust data backup process can go a long way in blunting the threat posed by ransomware. In fact, it is often the only way to recover data if you are unwilling to pay the ransom demanded by an extortionist. But there are other measures that organizations can take as well, including the following:

Authenticate In-Bound Email

Email is a commonly used method to distribute ransomware. Attackers target victims with cleverly spoofed emails that appear to originate from someone the victim knows. The emails have malicious attachments which when opened results in the ransomware being downloaded on the victim’s system.

One of the most effective ways for an organization to blunt this threat is to validate the origin of an email before it is delivered to the intended recipient, says Craig Spiezle, executive director and president of the Online Trust Alliance (OTA).

Implementing sender identity technologies like Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) can all protect organizations against spear phishing, business email compromise, and other threats posed by spoofed email, Spiezle says. They work by validating the IP address and domain of the server from which an email originates.

“Unfortunately, most corporations are not authenticating inbound mail,” Spiezle says. And when they do, the policies are not strong enough. For example, emails that fail authentication tests are often simply quarantined or sent to a junk folder.  Instead, “corporations that have sensitive information should have a reject policy for email that fail,” authentication tests, he says.

Protect Your Email Servers

Sender authentication can mitigate the risk of ransomware being delivered via email. But that alone is not sufficient, says Craig Young, security researcher at Tripwire. If you haven’t done so already, protect mail servers by scanning all stored, incoming, and outgoing mail. Such scanning can help organizations detect threats that might have evaded perimeter defenses or infiltrated the network via compromised systems and internal email. Numerous tools are available for scanning email servers for security threats. Take advantage of them, he says.

“Email authentication is a good measure to have,” Young says. “But there’s always a chance that a legitimate email server is used to send out spam emails,” and other malware, he says.

Add Ad Blocking

In addition to emails, attackers often distribute ransomware through malicious advertisements served up to users when they visit certain sites. Malvertisements allow attackers to target victims based on their browsing habits, location, demographic information, device characteristics, and other criteria. Ransomware served up via watering-hole attacks often tend to be more dangerous than random attacks because they are targeted at victims which the attackers know have the capability to pay up.

Blocking ads from being delivered on user systems or preventing users from accessing certain sites can diminish this risk somewhat, Spiezle says. Organizations that want to accommodate unrestricted access to the Internet for employees might consider implementing a separate network for them to do so, he says, pointing to one government contractor that has taken this approach.

Monitor File Activity 

With ransomware, an attack against an individual can quickly escalate into an attack against the enterprise, says Amichai Shulman, chief technology officer at Imperva. Many ransomware tools have the ability to encrypt not just the hard drive of a system, but also any shared files.

In fact, rapid file overwriting is one of the clearest markers of ransomware on your network, he says. So using a tool to monitor file activity is a good idea, says Shulman, whose company sells an activity-monitoring tool.

“If you are constantly monitoring access to file servers, there are very distinctive patterns that you can look for in order to detect ransomware,” on an endpoint, he says.

Such early detection can help organizations contain the damage that a ransomware tool can wreak, he says. “The advantage is that you can go quickly into quarantine mode for the infected machine and make sure it doesn’t connect to any other file server,” in the enterprise.

Keep Your Response Plan Handy

Time is critical for an organization faced with a ransomware deadline. Online extortionists typically give organizations a very specific time limit within which to pay -- fter which they sharply increase the ransom amount. Attackers have gotten increasingly better at knowing what an organization can afford and knowing exactly when to strike, Spiezle says. They deliberately don’t give enough time for an organization to figure out if it can try and unlock the data without paying any ransom.

So it is important to have a plan in place describing what needs to happen in the event of a ransomware attack. Do an inventory of your critical data assets, know where it is located, and evaluate that impact of any loss or unavailability of that data.

 “One of the worst things is the chaos that ensues during an incident like this. Emotions run high, people don’t have the answers and they are scrambling,” to respond. he says. “The last thing you want is to be doing a Google search for a local forensics experts at 2am on a Saturday morning.” 

Related Content:

Interop 2016 Las VegasFind out more at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Register today and receive an early bird discount of $200.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
5/16/2016 | 9:44:20 PM
New Strain are Smarter than just targeted common file extensions! Your backup needs to be secured!
Apart from all the other Ransomware Protection best practice 101 guides.....


First of all just because you are encrypting your backups doesn't mean a ransomware cannot re-encrypt it. We've had a few cases where all clients had their encrypted backups targeted and damaged by ransomware! Your best defence to safe guard your backups:

1. Permissions - Remove all default file & folder permissions on the repository folder. Specifically add a single backup user permission. eg. create a user "repobackup" with read & write. Deny group administrators to this folder and other groups & users.

Configure your backup software to specifically use the repobackup user to do it's business.

Any access to this folder except for the user repobackup will be denied. So all attempts of the ransomware to find it on the network (including accessing hidden shared drives, c$, d$,etc etc) will be denied access to it once it hits your repofolder.

(even ransomware as they wont have permission to it.)

2. Sftp/scp -  some backup software have modules that will allow for remote replication via SFTP/SCP. You should make use of them.


Secondly, you shouldn't rely on simply tricking "ransomware" with renaming your files. We've had two cases of modified ransomware (well they should call it "ransom DAMAGEWARE") that had absolutely no intention of giving victims their data and allowed for * file extension.



OPTION if it is available to you.


Explore the software from "Cylance" for your unconventional Security Suite. So far clients that chose to implement it (following previous attacks), have been miraculously somewhat protected. Even with the new strains such as when Locky started to appear, it has seemed to have innoculated it.
User Rank: Ninja
2/9/2016 | 12:53:45 PM
Because ransomware is capable of attacking both local and remote backups, the best line of defense is a proper retention policy of encrypted backups. I suggest a minimum of 2 weeks.

Since the backups are already encrypted, they are simply not vulnerable. No matter what method of attack is used. The ransomware will not have access to these files to apply it's own encryption algorithm.

Also, as far as I know the method of attack utilized is soley by file extension. Ransomware is not yet capable of anylizing mime type file headers. That being said, renaming the extension of a known file type such as a word document (ie .docx) to something completely obscure (ie .zyx612), followed by changing the new file type association to open with MS Word will result in the file indexing of the ransomware to bypass encryption of the unrecognized extension.
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-10-22
The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root.
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\messages\messages_thread.php uses an unsanitized "contact_uuid" variable coming from the URL, which is reflected on 3 occasions in HTML, leading to XSS.
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_addresses.php uses an unsanitized "id" variable coming from the URL, which is reflected in HTML, leading to XSS.
PUBLISHED: 2019-10-22
In FusionPBX up to 4.5.7, the file app\contacts\contact_edit.php uses an unsanitized "query_string" variable coming from the URL, which is reflected in HTML, leading to XSS.
PUBLISHED: 2019-10-22
The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring.