How to Create a Modern Ransomware Security Strategy
Total Page:16
File Type:pdf, Size:1020Kb
HOW TO CREATE A MODERN RANSOMWARE SECURITY STRATEGY Government and education leaders should focus on the three pillars of technology, people and policy to guard against sophisticated hackers. 1 2 CONTENTS 04 INTRODUCTION 06 A CLEAR AND PRESENT DANGER NEW TOOLS TO FIGHT RANSOMWARE: 08 TECHNOLOGY • Ensure endpoint protection • Leverage next-generation firewalls • Incorporate artificial intelligence and machine learning • Keep up to date on software patching • Manage inventory • Leverage third-party threat intelligence services 12 PEOPLE • Update end-user training • Involve stakeholders in training design • Address risky behavior • Consider attack simulations • Focus on behavior change, not punishment • Help security and IT teams stay sharp • Keep security front and center 16 POLICY • Start with data governance • Realize the importance of backup and recovery • Rethink identity and access • Validate your security plans • Compare yourself to others • Consider consolidation 18 SECURING THE FUTURE 3 INTRODUCTION After sharp spikes in Grunzweig, senior malware governments and education ransomware attacks in recent researcher with Unit 42. institutions, which are years, the total number seeing more focused and of incidents is trending A drop in the sheer number sophisticated ransomware downward in 2018. But that’s of attacks is encouraging for attacks this year. not necessarily good news government leaders who because these attacks also are have updated their security For example, Unit 42 has been becoming more targeted and strategies to better protect tracking a spike in SamSam, potentially more dangerous. networks and reduce the need a ransomware family that’s for employees to make split- been around for years but Unit 42, the research arm second decisions about which now has become a go-to for of Palo Alto Networks, emails or web links are risky. targeted public sector attacks says it tracked 890,000 But more needs to be done. ransomware attacks across “Hackers are using it to state and local government The lure of profits is enticing first determine how many over the past two years. international criminals to computers are on the targeted exploit new vulnerabilities, organization’s network, and “But when we look just at the including those that surface once they’ve identified a large first six months of this year, as the Internet of Things (IoT) number of systems, they’ll we’re seeing a 20 percent gains traction. Continued deploy the ransomware to decline compared to the same diligence is particularly all of them,” Grunzweig says. period in 2017,” says Josh important for state and local “We’ve seen hackers make 4 “Ransomware isn’t a fad. Why? Because it works. When faced with the reality of losing our digital belongings, affordable paths out suddenly seem reasonable. Herein lies the problem. The bad guys have gotten better at automating the delivery of ransomware and are monetizing our fear of losing.” Lucas Moody, Chief Information Security Officer, Palo Alto Networks some significant updates to couldn’t pay bills for municipal cybersecurity approach that SamSam in this past year.” services online and the city’s incorporates integrated security airport halted Wi-Fi service platforms; a focus on people, One large U.S. city became a for a time. The mayor called including modern training SamSam victim early in 2018. the exploit “an attack on our techniques; and stronger According to news reports, government, which means policies and processes to for nearly a week last March, it’s an attack on all of us.” prevent and contain ransom city employees couldn’t use How can public sector attacks. Where to start? This their work computers, forcing officials up their security handbook presents a plan to many to rely on pen and game to counter targeted understand today’s ransomware paper.1 Citizens and tourists ransomware attacks? The threats, along with best also suffered. Residents answer is a comprehensive practices to prevent them. 5 A CLEAR AND PRESENT DANGER In the last year, hackers attractive targets for cyber- authority to spot and targeted multiple state and thieves because IT resources prevent illegal activities. local governments, as well as are often underfunded higher education institutions, compared to many commercial 3. People are a weak link: with sophisticated exploits. enterprises. Opportunistic Because social engineering is For example, cybercriminals hackers probe government so successful at gaining access used a variant of SamSam and education networks into protected public sector to take over IT systems hoping to uncover aging systems, it remains a common at a state department of infrastructure or incomplete tool among ransomware transportation, forcing 2,000 security measures. And hackers. Infected attachments, employees off the network when they find an opening, malicious Java scripts and while officials tried to isolate hackers have a variety of links to infected websites the attack.2 Particularly malware to stage an attack. all lurk in targeted, carefully troubling was a follow-up Data thieves use asymmetric written emails that result from attack on the department cryptography, which combines upfront research by thieves. within two weeks that public and private data keys occurred before 80 percent to encrypt valuable public Similarly, exploit kits, such of the systems infected in the sector information. To recover as those associated with first assault were restored.3 their data, victims must pay SamSam, troll networks The department’s employees to receive the private key. for missing security resorted to pen and paper patches and other gaps to perform some of their 2. Crypto-currencies enable that enable a widespread duties during the downtime. extortion: It’s not just the ransomware infection. latest and greatest forms Three factors contribute of malware that make Also on the list of public to the prevalence of ransomware so successful. sector vulnerabilities are ransomware attacks against Digital innovations also ubiquitous web-based public institutions. provide criminals with new file sharing applications tools to turn extortion into that enable even security- 1. The public sector is an a moneymaker. Crypto- conscious staff members to easier target: State and local currencies like Bitcoin breach internal information- government, along with higher enable ransomware hacks sharing policies without the education institutions, are because there isn’t a central IT department’s knowledge. 6 INSIDE THE CYBER ATTACK LIFE CYCLE PLANNING SILENTLY EXECUTING THE INFECTING MALICIOUS ATTACK DEVICE FILES ESTABLISHING RECEIVING COMMUNICATIONS RANSOM AND/ WITH THE OR STEALING, ATTACKER SABOTAGING, DESTROYING DATA 7 NEW TOOLS TO FIGHT RANSOMWARE As public sector security officials formulate a comprehensive cybersecurity strategy to fight ransomware efforts, they must focus on three core areas: technology, people and policy. TECHNOLOGY Battling today’s sophisticated vulnerabilities. Leaders should threats requires an integrated use platforms to help them: platform approach to cybersecurity, rather than Ensure endpoint protection: disconnected point solutions. Because endpoint protection is a key component “Public sector organizations within integrated security must take advantage of the platforms, public sector IT multiple opportunities they staffs should make sure this have to prevent ransomware technology includes the attacks,” says Scott Simkin, latest capabilities. Evaluate director of threat intelligence endpoint applications for how at Palo Alto Networks. “That easily they exchange security can only be done with an data with other network end-to-end security platform.” defenses. Ideally, endpoint and network security devices These platforms should should work together to spot include integrated modules possible security threats, for web security, next- share insights and collectively generation firewalls and take appropriate action the latest endpoint security according to the organization’s capabilities, which work policies and directions together to prevent attacks. from the security staff. Unlike point solutions, security platforms enable data sharing Leverage next-generation and automation across firewalls: Next-generation multiple security components firewalls (NGFs) implemented to quickly address new within the overall security 8 platform monitor network traffic to identify and block known and unknown threats, including zero-day malware. NGFs can quarantine suspicious software until further tests determine whether it’s a threat. Unlike traditional firewalls, NGFs assess data from any communications port and physical or virtual IT resource. Eliminating the theft of passwords and other credentials is a primary goal when protecting the organization. When valid authorizations fall into the hands of hackers, they can breach a network’s defenses and then move easily across internal resources. One differentiator among top-tier security vendors are capabilities that mitigate credential theft, applying prevention capabilities during any point of the attack life cycle. These advanced products block end users from submitting credentials to websites that are suspicious or known to be used by cyber- thieves. The tools also enforce network authentication polices to keep hackers from using valid credentials to move throughout internal networks. Incorporate artificial intelligence and machine learning: An effective security Unlike point solutions, platform also will incorporate security platforms artificial intelligence (AI) and