Ransomware Readiness Guide
Ransomware Readiness Guide
Readiness
Assessment
Guide
Is your organization doing everything
it should to protect against ransomware?
Most security practitioners are all too familiar with ransomware. Ransomware protection is more than detection, more than
data backup and recovery, and more than phishing protection.
What you may not realize is that the vast majority of ransomware
attacks (82%) are focused on small businesses. This should So, how can you tell if your organization is ready for a
come as no surprise given that small to mid-sized businesses ransomware attack?
can't afford the same technologies, cybersecurity expertise,
and staff training as larger enterprises. This makes smaller This guide will help you see if your organization is taking all the
businesses easier targets because cybercriminals know they will appropriate steps to not only prevent ransomware, but also
have a higher chance of success. respond to a ransomware incident.
Fortunately, smaller businesses can readily bolster their The assessment follows the NIST CSF Framework to gauge
protections without breaking the bank. your organization’s readiness to Identify, Protect, Detect,
Respond, and Recover from ransomware attacks. We’ll walk
Newer cybersecurity technologies and industry frameworks you through each framework function so that you can assess
provide a means for even the smallest organization to strengthen your security gaps and provide insights for bolstering your
protections and reduce their risk of a successful ransomware ransomware security posture.
attack.
One of the most common ways that security events become incidents is
through compromised credentials. This allows the criminal to install their
ransomware onto your computers. Strengthening both the credentials and
the systems that use them will go a long way to preventing ransomware
success.
Ransomware often succeeds because the criminals can trick an employee into A certain form of simulation, often called breach simulation or a cyber range,
downloading and opening software either through a corrupted attachment is used to educate executives and corporate boards on what an attack looks
in an email or through a link on a website. Employees easily mistake these like.
links and attachments as having a legitimate business purpose, and the
criminal preys on the employee’s desire to be effective in their jobs.
to centrally install all software The criminal can sign their code using an approved signing authority and
name their software to match the names of software which will be on most
onto each computer in the organization's allow lists. While this control can be effective, it should be
organization. implemented with other controls and not relied upon exclusively.
URL filtering is a technology that examines the entire URL. It ensures that the The use of URL filtering can prevent the download and installation of
URL is safe to visit and meets the organization's policy requirements before ransomware onto a computer even if the employee falls for a criminal scam
the system allows the computer to open the page. and clicks on the link. It helps your organization ensure that it won’t become
a victim of your employees’ mistakes.
URL filtering often not only prevents access to the destination address
without review, but also prevents the viewing of the target URL by hiding URL filtering that is informed by threat intelligence, not only ensure that a
the true destination through one of several techniques. This may include URL is not trying to steal credentials, steal data, or install software such as
masking the URL with one that does not show the destination, or simply ransomware, but also that the destination host is credible and won’t try to
rewriting the URL with a URL that will forward the browser first to a safe site steal credentials, data, or install software once the employee starts using it.
which will evaluate the final destination and then either send the traffic onto
that destination, or a page that explains why access is denied.
This control prevents emails sent by criminals designed to steal credentials, SPAM filtering can prevent emails that trick the trusting employee into
data, money, and/or install malware including ransomware from being opening an attachment or clicking on a URL – the most common means that
delivered. Better SPAM filtering applications use artificial intelligence to ransomware is distributed.
analyze both the email and the reputation of the sender. It can then prevent
the delivery of the message. It can also prevent more sophisticated attempts to steal from your
organization, called spear phishing and whaling. These are well-constructed
targeted attacks against specific persons, often the senior leadership of your
Good SPAM filtering will organization and board of directors.
filter the URLs in all emails
But remember – SPAM filters aren’t the only solution to preventing
that are delivered, and good ransomware attacks. Ransomware can also be delivered through SMS
messaging, which can’t be filtered through SPAM filtering tools.
SPAM filtering will evaluate all
attachments to ensure they
don’t contain malware.
This technology is often called Security Information and Event Management evidence of a security incident. Alerts can then be sent to appropriate staff so
(SIEM) system. When configured properly, all software should create an that an appropriate response may be coordinated.
electronic ledger of the actions taken in the interaction with the software. This
ledger is called a log and will track who did what, when, and with what result. It can also detect and alert on ransomware being downloaded and installed
Well done logs will be very explicit of the event, so that a clear record is created before it executes and starts encrypting the system. It can also alert when files
that can be played back by either human or software to recreate exactly what are being modified in bulk, allowing a fast response to ransomware that’s
was done. active on a system.
Centralized log management (CLM) is the combination of process and As the volume of logs and network flows is too much for humans to continuously
technology to collect logs from all the software run in an organization and place monitor, both machine learning and user behavior analytics are often used to
them into a single place where events across multiple systems can be tracked. analyze events for anomalous behavior.
Log management software will provide the means to query the logs regarding
specific and related events, tracking them forward and backwards in time. These centralized log management systems also are used to provide evidence
of a crime. They're commonly integrated with other defensive technologies
Logs are another kind of data and will need to be managed as data. Both like ticketing systems, Intrusion Prevention Systems, Data Leakage Prevention
the archiving and deletion of logs is an essential component of a good log Systems, Security Orchestration, and Response to ensure effective incident
management system. management.
While most information security controls focus on the organization, threat Threat intelligence uses specialized technologies to communicate results like
intelligence involves looking outside of the organization at the entirety of STYX and TAXII. Contributors to threat intelligence systems will use the traffic
the internet. light protocol to indicate the specifics of how data may be shared across
threat intelligence platforms. Threat intelligence may provide signatures
There are places on the internet not found using normal search engines, of malware, actual IP addresses and email addresses of known malicious
some of which require authentication to access, while others simply hide. actors, along with indicators of compromise (IOCs).
This part of the internet is called the dark web. Threat intelligence aims
to provide a view into what is happening on the Darknet, revealing places Threat intelligence makes other tools more effective.
where stolen data is offered for sale and where stolen credentials are made
available to help attack organizations.
The acronyms stand for endpoint detection and response, extended behavior analytics mistakenly categorized unusual activities as malicious.
detection and response, and managed detection and response.
EDR/XDR/MDR systems are the most effective defense against ransomware
Essentially these technologies are the modern replacement for anti- because they act across all phases of the cyber security framework – acting
malware, using either machine learning or user behavior analytics to detect to identify the malware, detect it, protect against it, respond to it, and
when malware is downloaded, installed, or activated. automate the recovery from it.
The EDR/XDR/MDR software does more than just alert on an incident in EDR/XDR/MDR systems will write logs of its actions and interactions into
progress, it will sometimes initiate an automated response. This will work a centralized logging and alerting system like a CLM or SIEM. This way an
to shut down the malware, isolate it so that it can't execute again, roll back independent record can be maintained of the systems’ activities can be
anything that was changed by the malware, and eliminate it from other retained and archived as per the organization's data retention policy.
machines where it may or may not have started to activate.
MDR has the added benefit of humans monitoring the system for malware
that the automated response fails either partially or fully. The human agents
can then step in and complete the response. These human agents can also
roll back the activities of the MDR system if the machine learning or user
The plan should have a framework for post event analysis of the response so
that you can capture lessons learned and make improvements.
Regardless of the nature of the incident or disaster, few can communicate As part of an IR plan, predeveloped communications provide a means to inform
complex issues effectively during the stress of the investigation. senior management, customers, and staff regarding the events your organization
is managing and how you're coordinating the response.
Creating communication You should also have prewritten communication to the press in case you need
templates ensures that the team to respond to public disclosure of a data breach or ransomware attack.
While speed of response is a common success metric of an IR capability, the It’s essential to know how ransomware got into your environment. While an EDR/
ability to effectively analyze an event is a crucial capacity. XDR/MDR system can show how the ransomware got onto a system, it may not
be able to demonstrate the root cause of the incident. In-depth analysis of the
Both machine learning and User Behavior Analytics are ways to automate incident to uncover the root cause is necessary to ensure that an organization
parts of the analysis of an incident, but neither has the capacity to collect knows what to fix to be resilient to future incidents and won’t suffer a second
and review all relevant details of every kind of event. Being able to coordinate ransomware attack after the first one is resolved.
that the denial-of-service attack seen from a particular set of IP addresses
was a smoke screen to hide data exfiltration to a different set of IP addresses
is the kind of analysis that, for the moment, only humans can accomplish.
Security Orchestration, Automation, and Response (SOAR) is a technology SOAR systems usually have complex workflows to automate parts of the incident
that coordinates activities across disparate systems, ensuring changes on response plan using inputs from both the EDR/XDR/MDR and the CLM/SIEM.
servers, networks, firewalls, applications, web application firewalls – all
resulting from a single event.
Unattached data storage devices are devices like tape backup systems from before the incident began to ensure that you’re not restoring files that are
or other removable storage where the connection to the data source is already in the process of being encrypted or able to re-infect your environment
temporary and not periodic. A different tape is used every day to ensure that with the malicious software.
the contents of the data on a particular tape are available for restoration
upon need. It's common to take multiple kinds of backups, referred to as incremental and
full. An incremental backup only backs up what changed since the last backup.
Ransomware works by preventing access to data. If that data can be restored A full backup backs up the entirety of the system. To get the most complete
from a device not infected by the ransomware, then the path to recovery can recovery, you may have to restore from multiple tapes.
be swift and relatively cost free. You will want to choose a point of restoration
Cloud hosted data storage is essentially an external storage device hosted by Be aware, however, that cloud hosted data storage can also be the mechanism
a third party to which data can be written to and read from at the same speed through which ransomware is spread from system to system and organization
and with the same flexibility as local drives. These systems are amazingly to organization.
powerful, allowing for lots of storage and the ability to share data across
organizational boundaries. Cloud hosted storage can be both the means to recover swiftly from ransomware
and the root cause of the infection. As a data repository, it needs proper
A key component of cloud hosted data storage is that it has the capability to management.
roll back changes.
Cloud hosted data storage can detect the pattern of the sudden bulk change
of files being encrypted by ransomware, alert you to the problem, and
facilitate roll back to a known good state.
Ransomware can both shutdown an organization as well as be the root Recovery plans should be drilled by your organization in the event that all its
cause of a data breach. Your organization's IR plan will allow you to stop the controls fail to stop a successful ransomware attack, it can return to normal as
attack, identify root cause, and take steps to prevent recurrence. swiftly and smoothly as possible.
A recovery plan for ransomware must include the means to recover data
that is encrypted by keys you don’t control, how to reestablish operational
systems, and how to restore customer trust in the event of a data breach.
You don’t want to figure out what to say to your management team, fellow
employees, board of directors, customers, the press, law enforcement,
Good communications plans are
government regulators, or even your staff in the heat of an ongoing incident. honest and transparent.
Having a good communications plan that defines who says what to who They reveal a blameless root cause of the problem, and layout what has been
under what circumstances using what mechanism is essential both to the done to stop the event, as well as prevent future occurrence.
smooth operations of both incident and recovery plans. A well developed
and executed communications plan is essential to restore trust regardless of Organizations that fail to do this suffered from bad press. Organizations that do
the nature of the incident. it well often have less customer flight.