Endpoint

10/5/2017
05:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

How Businesses Should Respond to the Ransomware Surge

Modern endpoint security tools and incident response plans will be key in the fight against ransomware.

The global rise of ransomware has businesses taking a closer look at their protective tools.

More than one-third (35%) of security pros in Dark Reading's "The State of Ransomware" survey detected ransomware on their systems in the past year. Only 27% say modern antimalware tools are very effective in stopping ransomware; 56% think they are somewhat effective.

Half of IT practitioners believe it will be harder to prevent ransomware from infecting their systems two years from now, researchers found. This begs the question: what are security vendors doing to improve the effectiveness of their systems, and which should businesses use?

"Because ransomware is high-profile, it's an opportunity for practitioners to be proactive and have a discussion about response and upgrading defenses," says Mike Rothman, analyst and president at Securosis. "They go after everybody, and everybody can pay ransom."

Advancing endpoint security

"One of the things we see businesses doing is turning to their messaging security provider first for answers and solutions," says Rob Westervelt, research manager within IDC's security products group. "That's blocking it before it even gets to the end user, which ultimately is best as opposed to having the end user click a malicious attachment or malicious URL."

When attackers bypass messaging filters and employees start clicking malicious attachments that made it into their inboxes, it becomes an endpoint security problem. While he doesn't see many companies building new products to specifically protect against ransomware, Westervelt says there is more messaging from vendors about their ransomware capabilities. Some have begun to add new "bells and whistles" to monitor strange system behavior.

"You have to advance your endpoint protection," says Rothman. If you're dealing with a system from 2013, you don't really stand much of a chance against the attacks that are happening today."

Most endpoint vendors, both traditional antivirus and disruptive startups like Cylance, can monitor for abnormal activity like signs of files being encrypted quickly. Some tools, like Sophos' Intercept X, has technology that can roll back encryption, Westervelt explains. Some solutions, instead of simply alerting to an attack, quarantine a system to ensure it doesn't spread.

"Everyone in endpoint protection is starting to add file monitoring as a new capability in their system," says Rothman. "Looking for anomalous file activity on the endpoint and stopping that … when folks start accessing files that haven't been accessed in a long time, something funky is going on."

Westervelt points to the growth of companies with a stronger focus on file access monitoring. Varonis, for example, solely focuses on data access. It's not so much about looking for malware as it is about monitoring files for abnormal activity. CyberArk, another, focuses on privileged account security. It's not standard AV, he says, but it looks for ransomware behavior.

In addition to monitoring for anomalous file activity, Rothman also advises ensuring you have strong exploit protection and the ability to fight fileless attacks; those that don't use the file system but store the encrypted payload in the registry.

"It's about making sure you're using modern defenses to deal with modern attacks," he continues. "A lot of technology out there is not modern defense."

The problem with additional ransomware protection is the heightened risk of false positives, Westervelt says. A system may start to flag employees who do a lot of encryption and file changes as part of their job, and block behavior that is abnormal but still valid.

"It only takes one false positive, one disruption of an important business deal to cause the CISO to lose their job," he notes.

Preparing a response plan

Regardless of the level of your technical control, Rothman emphasizes the importance of developing a response plan. Many companies don't have a plan, particularly midmarket organizations that pay little attention to security.

"They have to have that initial conversation about what to do if their machines get locked up," he explains. "When your machines are mostly encrypted and showing the 'Pay Us' screen, that's not the time to be figuring this stuff out."

Rothman advises businesses to work through their response processes and what their tolerance would be for a certain set of scenarios. When those are decided, it's time to practice.

"Practice identifies the holes and gaps in your process," he explains. "The only way to figure out what works and what doesn't work is to actually do it … some organizations use tabletop exercises. I can't recommend that enough."

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
dminns@tellall.ca
100%
0%
[email protected],
User Rank: Apprentice
10/6/2017 | 9:32:04 AM
Re: Restore Plans and Backups
Agree 100% with REISEN1955

These endpoint security are only like moats and walls around a castle  - eventually, as history shows, they get breached   -  'air-gapped/ off-site' backups, ready for recovery/continuation are the plan B once the breach occurs. 

 
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
10/6/2017 | 7:11:02 AM
Restore Plans and Backups
I am getting sick and tired of the NEW discoveries being made by the bad management of IT systems when it comes to Ransomware.  OMG - we have been saying for 20 years to have GOOD BACKUP PLANS and TEST them and also have good workstation restore plans and educate users and ...... and yet each time WOW, THIS IS A GREAT NEW IDEA???????
6 Ways Greed Has a Negative Effect on Cybersecurity
Joshua Goldfarb, Co-founder & Chief Product Officer, IDRRA ,  6/11/2018
Weaponizing IPv6 to Bypass IPv4 Security
John Anderson, Principal Security Consultant, Trustwave Spiderlabs,  6/12/2018
'Shift Left' & the Connected Car
Rohit Sethi, COO of Security Compass,  6/12/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12026
PUBLISHED: 2018-06-17
During the spawning of a malicious Passenger-managed application, SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows such applications to replace key files or directories in the spawning communication directory with symlinks. This then could result in arbitrary reads and writes, which in tur...
CVE-2018-12027
PUBLISHED: 2018-06-17
An Insecure Permissions vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 causes information disclosure in the following situation: given a Passenger-spawned application process that reports that it listens on a certain Unix domain socket, if any of the parent directories of said ...
CVE-2018-12028
PUBLISHED: 2018-06-17
An Incorrect Access Control vulnerability in SpawningKit in Phusion Passenger 5.3.x before 5.3.2 allows a Passenger-managed malicious application, upon spawning a child process, to report an arbitrary different PID back to Passenger's process manager. If the malicious application then generates an e...
CVE-2018-12029
PUBLISHED: 2018-06-17
A race condition in the nginx module in Phusion Passenger 3.x through 5.x before 5.3.2 allows local escalation of privileges when a non-standard passenger_instance_registry_dir with insufficiently strict permissions is configured. Replacing a file with a symlink after the file was created, but befor...
CVE-2018-12071
PUBLISHED: 2018-06-17
A Session Fixation issue exists in CodeIgniter before 3.1.9 because session.use_strict_mode in the Session Library was mishandled.