RANSOMWARE – HOW TO BEHAVE WHEN WE ARE ATTACKED AND HOW TO PROTECT OURSELVES TO MAINTAIN THE CONTINUITY OF BUSINESS PROCESSES
What is a ransomware attack?
At first it seemed to be something with the network. But then it turned out that it was not only with the network, but with everything. And not just on one computer, but on all nothing works!
More or less like that they look symptoms of a ransomware attack. Later, a ransom demand will likely appear. These can be large amounts in hacker-safe cryptocurrencies.
A probable attack scenario is as follows:
- Infection,
- Reconnaissance and data theft,
- Encryption and ransom demand.
A ransomware attack is a shock to people and organizations. Panic sets in and we slowly realize what happened and what the consequences are. The question also arises, what to do next?!
The first and most severe effect of the attack is that the company cannot operate. It is impossible to do anything (in most cases, literally nothing these days) similar to the lack of electricity in the office or on the production floor, with the difference that the power returns at some point, but the data unfortunately does not reappear, and the software does not start working as before.
The attack also has a negative impact on employee morale and motivation, and on reputation with collaborators. In this case, managers must show that they have a plan to resolve the crisis, and that contacts with the company do not pose a threat to the business environment.
Another consequence of a ransomware attack is the likelihood of data leakage. This is a significant threat to the company, its employees and partners. If the attacker believes that there will be buyers for the stolen information (this may be personal data, salary tables, PESEL numbers, passwords, data constituting trade secrets, company secrets and many others).
The above description is just one scenario. An attack could also involve shutting down production processes in a steel mill, preventing rail communication from functioning, stopping the functioning of an e-commerce platform or preventing treatment in a large hospital. The goal of a ransomware attack is, as the name suggests, to obtain a ransom to restore access to data or restart processes in a company or organization. So the greater the financial or social costs, the larger the ransom attackers can demand.
Who can fall victim to ransomware attacks?
Everyone, including you, but the more severe the downtime, the greater the likelihood of an attack. Most often, however, cYbercriminals do not choose victims because they want to hit as many users as possible in order to make the most money.
There have been reports of ransomware operating in accounting firms, law firms, consulting firms, the automotive, food and pharmaceutical industries, healthcare, logistics, transport, energy, mining, banking, and power engineering. As you can see, the range of interests of cybercriminals is wide. It should also be added that it is impossible to protect yourself from an attack and its effects in 100%. However, actions should be taken to minimize the probability of the attack's success and ensure the possibility of quickly restoring the systems' operation if the attack is successful.
According to article on the Government Security Center website, even large companies fall victim:
- Garmin – WastedLocker malware, $10 million ransom payment confirmed,
- Banco Estado Chile – Sodinokibi malware,
- Canon USA – Maze malware,
- Orange SA – Nefilim malware,
- The Volksvagen Group – Conti malware.
What methods do attackers use?
There are many attack methods and they are constantly being improved. Among them are:
- Infected attachments and files – email attachments, files on USB drives or download links,
- Attacks on IT/OT infrastructure – exploitation bow in production line operating systems or SCADA controllers,
- Impersonating legitimate updates – ransomware pretends to be legitimate software or driver updates,
- Phishing and social engineering – malicious emails containing attachments or links leading to malicious websites,
- Exploitation of software vulnerabilities – exploiting known or previously undiscovered vulnerabilities of operating systems or applications,
- Attacks by service providers – use of cooperator or cooperating company software,
- Administrative credentials are captured – for example, via weak system administrator passwords or remote access sessions left logged in.
- Attacks on remote protocols (RDP) - exploitation of unsecured properly remote desktops,
- Attacks on network devices and servers,
- Ransomware injection via malicious ads (malvertising)
As you can see, there are many methods of attacks and threats and there is much to watch out for. That is why it is worth using the competences of experienced external companies or using the knowledge of your own IT departments.
How to behave after a ransomware attack and should you pay the ransom?
Unfortunately, there is no guarantee that the files will be decrypted after paying the ransom. This may be due to bugs in the decryption software or the attackers' lack of intention to allow decryption of the data. Additionally, forpaying the ransom reinforces the idea that their business is profitable or that they have achieved their goals. It can also be said that by paying the ransom, we are financing further activities of cybercriminals who improve their tools, which means more infections.
But there is also good news, because sometimes it happens that some data can be recovered using publicly available decryption keys. There is also a chance that due to the specifics of some types of ransomware, some data can be recovered even without access to the decryption key.
No matter what you need to act very quickly to prevent further hacker access to IT systems and, if possible, stop the data encryption process. The recommended actions are listed below:
- Isolation of infected systems: The first step should be to isolate infected systems from the network to prevent further spread of ransomware.
- Identify and remove threats: Using ransomware scanning and removal tools such as Malwarebytes to remove the active threat from your system.
- Attempting to decrypt files: Check available decryption tools on sites like No More Ransom to see if it is possible to recover your encrypted data.
- Restoring the system from a backup: If decryption is not possible, it is best to restore the system from a previous backup, if one is available.
- System analysis and security: Using analytical tools to understand how an attack occurred and implementing additional security measures to prevent future incidents.
In a company or organization, there should be a ready plan of what to do and how to behave when business continuity is threatened or impossible. Such a plan is called a Business Continuity Plan (BCP) and its content and scope results from the analysis of what is most painful for business processes and what specific risks affect these processes. An example of an analysis of the impact on the business (BIA) is oprice of the impact of the unavailability of the financial system on the company's ability to make payments. In turn, risk analysis (Risk Assessment – RA) is aboutthe risk of a critical payment server failing due to a ransomware attack.
In short, we should know in advance what we are most afraid of, when this threat may occur and how to prevent it.
What formal actions should be taken?
The attack also imposes certain formal obligations on managers. These will be:
- Reporting the incident to the President of the Personal Data Protection Office (UODO) – this must be done within 72 hours of detecting the incident.
- Notification of those whose data has been leaked (employees and others).
- Reporting an incident to the NASK Computer Security Incident Response Team (CSIRT).
- Reporting a crime to the prosecutor's office or the police.
- There may also be an obligation andInforming shareholders or business partners (larger entities and listed companies).
- Even while removing the effects of an attack, it is worth creating rincident report (for internal purposes and for future audits) and create guidelines forupdating risk management procedures and security policies.
In Poland, formal obligations in the event of a ransomware attack include reporting to UODO, CSIRT NASK and law enforcement agencies if it concerns personal data, critical systems or other resources subject to legal regulations. Quick action and documentation of the incident are essential to meet legal requirements and minimize the risk of sanctions (high financial penalties).
How to prevent ransomware attacks?
There are a number of ways to significantly reduce the vulnerability of IT systems to ransomware.
Among them are the following:
- Backups – preferably multiple copies on different media,
- Regular scanning and removal of vulnerabilities to cyberattacks – software updates and necessary reconfigurations,
- Network segmentation – limiting the possibility of ransomware spreading across the corporate network,
- Installing proven antivirus software with an option to prevent ransomware attacks (endpoint security),
- Periodic employee training to provide knowledge about current threats and ways to avoid them,
- Installing proven firewalls at the edge of the network that block cybercriminals from accessing IT systems from the outside,
- Securing remote access, for example by enabling multi-factor authentication (as in electronic banking systems),
- Monitoring and detecting threats – there are systems that allow for detecting attacks at an early stage,
- Proper policy for granting permissions to files and systems – granting users only those permissions that are necessary to perform their tasks,
- Incident response planning and testing.
It is worth mentioning here that additional security for a company or organization can be provided by:protection against cyber and GDPR risks offered by some insurance companies.
Summary
As described above, hacker attacks happen even in companies that pay attention to IT security issues, and there is no way to protect yourself from them in 100%. Protection against cyber threats is a continuous process, just as the methods of attackers are constantly being improved. However, we can reduce the chances of an attack succeeding and minimize its effects.
It is best not to be a victim, but even if it happens, remember that not everything is lost, and depending on whether and how many usable copies of data we have, we can restore the functioning of our systems. We also have a chance to decrypt some or all of the collected data.
We hope that our post will help you choose ways to protect yourself from ransomware attacks, and in the event of a threat, it will suggest what actions to take. In either case, please contact us. We will help.
Co-founder and CEO of UpGreat Computer Systems Sp. z o. o. The company has been supporting large and small enterprises from all over Poland in the field of information technology for 30 years. His main areas of interest are IT security, complex network solutions and group work systems. After hours, he savors the nuances of Stanisław Lem's prose.