The Anatomy of a Ransomware Attack

The Anatomy of a Ransomware Attack

THE ANATOMY OF A RANSOMWARE ATTACK Ransomware attacks are growing more sophisticated. Learn how they unfold and how you can prepare for the worst-case scenario. Most businesses are probably familiar with ransomware—a type of malware that criminals use to extort organizations by encrypting and holding their data hostage until they make a digital payment. What many may not know is that ransomware can lie undetected in an exposed organization’s systems for days, weeks or even months before it’s revealed through a ransom demand. Use the graphic below to follow the trail of a ransomware attack involving multiple malware strains that infiltrated an organization over the course of five months—ultimately impacting more than 11,000 servers and workstations. 10 | Commercial Banking The 7 Stages of Ransomware Attacks DELIVERY INSTALLATION An employee opens a The ransomware downloads phishing email and clicks onto that employee's on a link that contains workstation and begins ransomware. executing its malicious code. T T RIC TE K O B O M T E 1 2 3 TRIKE BEA S CO LT N A B O COMMAND AND CONTROL C The ransomware establishes a 4 connection with the attacker's command and control (C2) server to receive instructions. CREDENTIAL ACCESS Still undetected, the ransomware continues setting the stage for its attack by stealing credentials and gaining access to more accounts. DISCOVERY 5 The ransomware searches for ACTIONS ON OBJECTIVES files to encrypt—both on the local The ransomware begins workstation and on any networks encrypting local and network it has gained access to. files. The attacker demands K payment to have them U Y R decrypted. 6 7 LATERAL MOVEMENT Multiple accounts are compromised as the ransomware moves across the network. Cybersecurity: [??Issue sub title] | 11 Key: Malware Strains EMOTET TRICKBOT COBALT STRIKE RYUK MAZE Steals information, Often paired with BEACON The final malware A new, sophisticated form executes backdoor Emotet—steals login Using a custom implant dropped in the attack— of ransomware that steals commands and delivers credentials and identifies called “Beacon” this this ransomware encrypts private data in addition Ryuk payload. targets for Ryuk malware helps facilitate systems, devices and to encrypting local and ransomware. C2 and lateral movement. files until a Bitcoin network files. Criminals ransom is paid. then threaten to release the stolen data if the ransom is not paid. How to Ensure Your Organization Is Resilient The best protection against ransomware one set of backups is offline and » Contact your financial institution is to prepare for the worst-case scenario: inaccessible from your organization’s before attempting to pay a ransom major disruption across the full scope of network. to determine whether the financial your IT infrastructure. Some steps you institution can facilitate the » Contact your financial institution if can take to help plan for and respond to ransom payment. you are impacted by ransomware or a ransomware attack include: any malware so they can be on high » Consider purchasing a cyber insurance » Perform a Business Impact Analysis alert for any anomalous activity. policy—designed to mitigate risk (BIA) to predict the consequences exposure—that covers ransomware. » >> Contact law enforcement including of ransomware disruption and the Federal Bureau of Investigation’s gather information to develop Internet Crime Complaint Center (IC3). recovery strategies. » >> Provide training and education » Create multiple backups to restore for employees on how to identify and critical systems if the criminals delete respond to suspicious emails and your files (this sometimes occurs conduct phishing exercises. even after the ransom is paid). Ensure 12 | Commercial Banking.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us