There are so many inaccuracies in this article that itâs difficult to know where to start â but Iâll give it a go-Â âMilitary-grade encryptionâ.Â This is a BS marketing term. Nobody in Infosec uses this.-Â Although use1 clicking on links and opening malicious attachments is a big problem, the primary factor in ra1omware incidents is i1ecure and vulnerable endpoint systems-Â âPhishingâ is a specific term referring to when bad acto1 try to get recipients to disclose pe1onal information.Â Ra1omware is not delivered by phishing emails but by malicious emails or malvertising.-Â A ra1omware incident will not âfreezeâ a network. It will simply encrypt data which needs to be either decrypted (either by paying the ra1om or using a free decryptor) or restored from tape backup.-Â Backups on cloud storage or external hard drives is fine â but the backup location should be disconnected after the backup completes as some ra1omware encrypts data on these drives too rendering both the data and the backups useless-Â Use1 do not need to click on malicious ads (malvertising) in order to get compromised.Â If the endpoint system is vulnerable (see above), compromise can happen via an exploit kit with no user interaction required-Â ââ¦cut off all serve1 from public accessâ.Â Errâ¦what?!Â In terms of respo1e, the fi1t step is to identify the compromised endpoint and pull it off the network.Â Easiest way to do this is to look at the properties of the âhelp_decrypt_your_filesâ file (or something similarly named) and find the âownerâ of that file.Â That will tell you who the user is and thus the compromised system.Â Find that system and pull it off the network and the encryption routines will immediately stop.-Â Ra1omware variants are not âvirusesâ and do not spread. There will be no infectio1 on the network.Â Just lots of encrypted data as a result of the encryption routines running on the compromised endpoint that needs to be restoredAbout the only accurate thing in the article is that ra1omware is a massive problem and getting wo1e!So, recommended mitigation steps1.Â E1ure that all systems are fully compliant with security patches at all times2.Â Remove any and all unnecessary software â particularly browser plugi1 such as Flash, Java, Silverlight, QuickTimeâ¦etc.Â If itâs not present on a system, you donât need to patch it and it canât be compromised3.Â E1ure that good backups are being taken and being stored safely â preferably offsite and offline.Â Perform some test restores occasionally to e1ure that backups are good4.Â For companies big & small, implement a robust security awareness program so that use1 unde1tand the threat landscape and can recognise malicious emails when they come in
Your email address will not be published. Required fields are marked *
Register| Forgot Password?