<<

THE ANATOMY OF A ATTACK

Ransomware attacks are growing more sophisticated. Learn how they unfold and how you can prepare for the worst-case scenario.

Most businesses are probably familiar with ransomware—a type of that criminals use to extort organizations by encrypting and holding their data hostage until they make a digital payment.

What many may not know is that ransomware can lie undetected in an exposed organization’s systems for days, weeks or even months before it’s revealed through a ransom demand. Use the graphic below to follow the trail of a ransomware attack involving multiple malware strains that infiltrated an organization over the course of five months—ultimately impacting more than 11,000 servers and workstations.

10 | Commercial Banking The 7 Stages of Ransomware Attacks

DELIVERY INSTALLATION An employee opens a The ransomware downloads and clicks onto that employee's on a link that contains workstation and begins ransomware. executing its malicious code.

T T RIC TE K O B O M T E

1 2 3

TRIKE BEA S CO LT N A B O COMMAND AND CONTROL The ransomware establishes a 4 connection with the attacker's command and control (C2) server to receive instructions.

CREDENTIAL ACCESS Still undetected, the ransomware continues setting the stage for its attack by stealing credentials and gaining access to more accounts.

DISCOVERY 5 The ransomware searches for ACTIONS ON OBJECTIVES files to encrypt—both on the local The ransomware begins workstation and on any networks encrypting local and network it has gained access to. files. The attacker demands

K payment to have them U Y R decrypted.

6 7

LATERAL MOVEMENT Multiple accounts are compromised as the ransomware moves across the network.

Cybersecurity: [??Issue sub title] | 11 Key: Malware Strains

EMOTET TRICKBOT COBALT STRIKE MAZE Steals information, Often paired with BEACON The final malware A new, sophisticated form executes backdoor Emotet—steals login Using a custom implant dropped in the attack— of ransomware that steals commands and delivers credentials and identifies called “Beacon” this this ransomware encrypts private data in addition Ryuk . targets for Ryuk malware helps facilitate systems, devices and to encrypting local and ransomware. C2 and lateral movement. files until a Bitcoin network files. Criminals ransom is paid. then threaten to release the stolen data if the ransom is not paid.

How to Ensure Your Organization Is Resilient The best protection against ransomware one set of backups is offline and »»Contact your financial institution is to prepare for the worst-case scenario: inaccessible from your organization’s before attempting to pay a ransom major disruption across the full scope of network. to determine whether the financial your IT infrastructure. Some steps you institution can facilitate the »»Contact your financial institution if can take to help plan for and respond to ransom payment. you are impacted by ransomware or a ransomware attack include: any malware so they can be on high »»Consider purchasing a cyber insurance »»Perform a Business Impact Analysis alert for any anomalous activity. policy—designed to mitigate risk (BIA) to predict the consequences exposure—that covers ransomware. »»>> Contact law enforcement including of ransomware disruption and the Federal Bureau of Investigation’s gather information to develop Internet Crime Complaint Center (IC3). recovery strategies. »»>> Provide training and education »»Create multiple backups to restore for employees on how to identify and critical systems if the criminals delete respond to suspicious and your files (this sometimes occurs conduct phishing exercises. even after the ransom is paid). Ensure

12 | Commercial Banking