Ransomware

Prevent ransomware attacks and protect recovery systems

Protecting your business against ransomware

Ransomware has become one of the most common forms of cyber attack in recent years. Cryptocurrencies make ransom payments safer for attackers, and "Ransomware as a service (RaaS)" means that attackers don't need any technical skills to attack.

Osirium Privileged Access Security (including Privileged Access Management, Privileged Process Automation, and Privileged Endpoint Management) are the critical tools to help prevent ransomware attacks. Not only to prevent attacks but also to protect the systems, such as backups, which are crucial to recovery after an attack.

  • Prevent ransomware being installed
  • Prevent lateral movement of ransomware around the network
  • Protect backups and hypervisors

Privileged Access Security is a multi-layered approach to the prevention of ransomware attacks and protection of critical systems.

A typical ransomware attack

How does a ransomware work?

The attack begins

Even with the best training, human beings can be fooled by sophisticated phishing attacks or make a mistake. It's easy to click on a link that installs malware. So, a safety net is needed.

The best way to prevent ransomware from being installed is to prevent the user from installing applications on their laptops or workstations. Osirium Privileged Endpoint Management (PEM) is built to prevent unauthorised installs while letting users run approved applications with elevated privileges.

The attack spreads

Once malware is installed on the workstation, it looks for opportunities to cause the most damage. That usually starts by identifying valuable administrator accounts as they have the most access and can cause the most damage.

The local admin account on the workstation is a good starting point. The attack will then look for servers the user can access, other user accounts on the workstation, network shares and much more. It will look for the most sensitive data on customers, suppliers, staff and intellectual property. Anything that will help spread the attack further, or make ransomware recovery harder.

The attack may also exfiltrate interesting data and credentials that to be sold on the dark web even before the ransomware strikes. Although the attacker may claim to delete the stolen data after the ransom is paid that's not a solution. The information will already be in multiple locations on the dark web and can never be fully recovered.

The attack strikes

Modern ransomware attacks are patient. The malware waits until it has maximised its impact.

The attack will collect valuable data and credentials and infect critical systems such as hypervisors and backups systems. It may even wait until backup cycles have been completed to make a recovery as hard as possible. The attack may wait weeks or months before striking.

Once the strike begins, the malware works as quickly as possible. It tries to encrypt desktop and server systems before being noticed, or anyone can "pull the plug" to stop the attack. In the quest for speed, the encryption may not be perfect. Even if the victim pays a ransom and gets the encryption key, they may never be able to recover all their systems or data.

How Privileged Access Security protects against ransomware attacks

Prevent the attack installation

Malware is often hidden in seemingly legitimate software installation packages. Users have often been given a "local admin" account to install applications without asking the IT help desk. The user is happy because they can make changes without waiting. IT are happy they're not involved in minor tasks and can concentrate on more significant projects.

Unfortunately, it means it's easy to install malware. Osirium's Privileged Endpoint Management (PEM) allows IT to remove those risky local admin rights without increasing the workload for the help desk. If users can only install or run approved applications with elevated privileges, it's much harder for malware to infect the organisation..

Prevent lateral movement

If the valuable administrator privileges are never available or revealed to the admins, they can't be stolen by malware. All access to critical IT systems should always be via Privileged Access Management (PAM). Those systems include cybersecurity tools, databases, servers, network switches, backups, and much more. As well as preventing unauthorised access to those valuable admin credentials, PAM makes it easy to spot suspicious activity on the network.

PAM also encourages good credential practices. Humans are not good at using complex passwords, but password management with PAM removes that risk. Regular rotation of passwords becomes easy. As passwords can be updated in one place, the changes are fast, and there's no need to inform anyone that may access the systems - if you even know who they are.

Prevent misuse of privileged accounts

Using automation for all IT processes that depend on administrator access adds another level of protection for critical systems. Privileged Process Automation (PPA) ensures that all corporate and regulatory processes are followed, and users can't do anything they shouldn't. For example, an admin updating a rule on a firewall could accidentally open ports that an attacker will later use.

How can you recover from a ransomware attack?

Recovery plans will vary between organisations, but they typically have common features.

If the worst happens and a ransomware attack strikes, the first steps will be to restrict activation and further malware distribution to new systems.

The quickest way may be to shut down as many systems as possible as fast as possible. "Pull the plug." There are risks with powering-off systems, especially servers which may be in use. There is a balance of risk between damage caused by the shutdown and the risk of infection.

When an attack is in progress is the worst time to make such decisions. Before an attack starts, all organisations should consider their options.

They should build a plan for what to do after the attack is discovered. Importantly, the plan needs to be tested so the impact of an emergency shutdown is understood.

The organisation will have to decide whether to pay a ransom demand or try to rebuild systems from scratch. Either way, there will be a need to restore systems and recover data from backups. As noted earlier, even having the decryption key is no guarantee of being able to decrypt files.

Those backups could be the difference between restoring the business in days and weeks or never being able to recover. That's why it's so important to have extra levels of protection around backup systems, as has been recommended by the National Cyber Security Centre.

For more information

If you'd like to know more about how Osirium Privileged Access Security can be used to prevent ransomware attacks, please use the form below, and we'll be in touch.

Want to know more?

If you have any questions or want to speak to one of our representatives, please complete this form and we'll be in touch.

+44 (0) 118 324 2444
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.