A few years ago, ransomware was primarily a consumer problem. However, cybercriminals behind recent ransomware attacks have now shifted their focus to businesses. One example of this is ransomware families such as Ryuk, which is commonly used to target enterprise environments. Users in these enterprises are typically targeted with phishing emails containing Microsoft Office document files with embedded malicious macro code. In another example, RobbinHood ransomware uses a vulnerable Windows kernel driver that is included along with the malware. This vulnerability is then used to install the malware on the host system.
No.1 tip is to back up all your data and make sure you do a test restore. However, even with the latest-generation firewalls and antivirus on all desktops, ransomware can still get into a network. The most common attacks use email phishing with dodgy attachments, but we have also seen attacks using remote desktop services and infected data storage devices.
How to detect ransomware on your network
The first variants of ransomware used a small number of very specific file extensions, like .crypt. However, each new variant seems to use different extensions, and some even keep the file name intact. Because of this, you need to watch out for multiple symptoms of an attack, such as the five following signs:
1. Watch out for known file extensions
Even though the list of known ransomware file extensions is growing rapidly, it is still a useful method for detecting suspicious activity. Before you do anything, you need to get file activity monitoring in place so that you have both a real-time and historical record of all file and folder activity on your network file shares.
2. Watch out for an increase in file renames
File renames are not a common action when it comes to activity on network file shares. Over the course of a normal day, you may end up with just a handful of renames, even if you have hundreds of users on your network. When ransomware strikes, it will result in a massive increase in file renames as your data gets encrypted.
You can use this behavior to trigger an alert. However, if the number of renames goes above a certain threshold, you have a potential ransomware issue. Our recommendation is to base your alert on anything above four renames per second.
3. Create a sacrificial network share
Ransomware typically looks for local files first, then moves onto network shares. Most of the variants I have looked at go through the network shares in alphabetical order: G: drive, then H: drive, etc.
4. Update your IDS systems with exploit kit detection rules
Many IDS, IPS, and firewall systems come with exploit detection features. Exploit kits are used as a way to get ransomware onto a client through malspam or via compromised websites.
The two most common exploit kits (EK) associated with ransomware are the Neutrino EK and the Angler EK. Check if your network security monitoring systems are up-to-date and see if they have the capability to detect exploit kits.
5. Use client based anti-ransomware agents
In the past, companies like Malwarebytes have released anti-ransomware software applications. These are designed to run in the background and block attempts by ransomware to encrypt data. They also monitor the Windows registry for text strings known to be associated with ransomware.
Researchers are also looking at ways to “crash” computer systems when droppers are detected. Droppers are small applications that first infect target machines in preparation for downloading the main malware payloads. This will likely mean that the system is sent to IT where the attack should be discovered.
You should also inform your network users to avoid installing agents themselves. There is too much of a risk that they will install the wrong agent or they end up installing more malware on their systems.
Getting your data decrypted
Recently, the infosec industry rallied around a common goal to combat ransomware under the No More Ransom initiative. While the public face of this initiative is the portal nomoreransom.org, where almost 100 decryption tools are provided freely to anyone who may have the misfortune of being a victim of ransomware, the initiative is a true collective of organizations and law enforcement agencies combating ransomware and those behind such cowardly attacks.
Find out what variant of ransomware you are dealing with by reviewing any splash screens or by checking for information within ransom note text files. You can then search for a decryption tool on the nomoreransom.org website.
Will ransomware go away?
The simple answer to this is no. All indicators suggest that ransomware will remain a major and rapidly growing threat, fueled by anonymizing networks and payment methods. Expect to see an increase in ransomware variants that target websites instead of file stores. Linux.Encoder.1 is an example of this type of threat. When a website is attacked, the ransomware will hold the site’s files, pages, and images for ransom.
There are two key lessons here:
Ensure you are backing up your website.
Keep the website operating system and CMS fully patched.
Ransomware is also a growing problem for users of mobile devices. Lock-screen types and file-encrypting variants of ransomware will stop you from accessing anything on your mobile device, and file-encrypting variants will encrypt data stored on the device. You can decrease your chances of an attack by avoiding unofficial app stores and by keeping your mobile device and apps updated.
I’ll finish by repeating the advice: Ensure you backup all of your personal and work data, educate users on the risks, and disconnect problematic users from sensitive data.