Ransomware Guidance
    • 16 Aug 2024
    • 2 Minutes to read
    • PDF

    Ransomware Guidance

    • PDF

    Article summary

    The measures listed below are examples of how to better defend, mitigate, respond to, and recover from ransomware, and they are as context-specific as possible. This list is neither exhaustive nor applicable to every environment. Before implementation, proper testing is encouraged.

    Proactive

    • Implement multi-factor authentication for:

      • Publicly facing assets and critical services

      • Virtual Private Network (VPN) and other remote access solutions

      • Cloud services such Office 365 or G Suite

      • User accounts

    • Create, maintain, and test the validity and restoration process of backups, and ensure they're working correctly in case you have to restore from a backup using the 3-2-1 rule. For more information, see The 3-2-1 Backup Rule - An Efficient Data Protection Process on the Nakivo blog.

    • Use Application Control and allow-listing, such as AppLocker

    • Disable SMBv1 (really important!!)

    • Disable Office macros

    • Use principle of least privilege with local admin accounts. 

    • Maintain up-to-date patches to ensure endpoints don’t have older vulnerabilities 

    • Obtain and maintain cyber-insurance. Ensure it includes an incident response services retainer.

    • Implement a secure email gateway. 

      • Block .zip files and other extensions

      • Limit or highlight emails from external senders

    • Ensure firewalls are up to date and working as expected

      • Implement strong ingress filtering

      • Implement strong egressing filtering

        • Does Active Directory need to communicate with the internet?

      • Routinely audit ingress firewall rules

    • Set script files to open using notepad: Controlling JavaScript Malware Before it Runs

    • Implement hardened images for operating systems and services

    • Implement web or domain filtering

      • Block newly registered domains

      • Block sites and domains that are categorized  as “Malware” or “Suspicious” 

    • Ensure Anti-virus (AV) and Endpoint Detection and Response (EDR) is deployed across all corporate assets and properly functioning and updated

      • Routinely validate proper functionality

    • Implement a security awareness program, at least as it applies to email security as an exceedingly large portion of ransomware campaigns begin via email

      • Training about legitimate communication channels and document sharing platforms 

        • A web page with visual examples can be very helpful

      • What does “suspicious” and/or “malicious” look like?

        • Emails

        • Websites

        • Software

      • Training on how to report suspicious activity/emails

    • Red Canary Specific

      • Set up Automate trigger/playbook to alert on and contain malicious high severity detections. This contains precursors to ransomware 

    Reactive

    • Isolate the affected endpoint/s through Red Canary/EDR platform

    • Remove ransomware artifacts, restore from known-good backups, or re-image the system 

    • Determine root cause to prevent future occurrence

    • If needed, engage your cyber-insurance and get IR services allocated

    • Red Canary specific

      • Setup Automate trigger/playbook to key off of the subcategory Ransomware. This will contain active ransomware activity

    Additionally the CIS top 18 contain steps to a strong foundation and include a lot of what is listed above.

    Additional resources: Prevent mitigate ransomware and Detecting and mitigating ransomware

     


    Was this article helpful?