Ransomware Guidance
    • 16 Aug 2024
    • 2 Minutes to read
    • PDF

    Ransomware Guidance

    • PDF

    Article summary

    The measures listed below are examples of how to better defend, mitigate, respond to, and recover from ransomware, and they are as context-specific as possible. This list is neither exhaustive nor applicable to every environment. Before implementation, proper testing is encouraged.

    Proactive

    • Implement multi-factor authentication for:

      • Publicly facing assets and critical services

      • Virtual Private Network (VPN) and other remote access solutions

      • Cloud services such Office 365 or G Suite

      • User accounts

    • Create, maintain, and test the validity and restoration process of backups, and ensure they're working correctly in case you have to restore from a backup using the 3-2-1 rule. For more information, see The 3-2-1 Backup Rule - An Efficient Data Protection Process on the Nakivo blog.

    • Use Application Control and allow-listing, such as AppLocker

    • Disable SMBv1 (really important!!)

    • Disable Office macros

    • Use principle of least privilege with local admin accounts. 

    • Maintain up-to-date patches to ensure endpoints don’t have older vulnerabilities 

    • Obtain and maintain cyber-insurance. Ensure it includes an incident response services retainer.

    • Implement a secure email gateway. 

      • Block .zip files and other extensions

      • Limit or highlight emails from external senders

    • Ensure firewalls are up to date and working as expected

      • Implement strong ingress filtering

      • Implement strong egressing filtering

        • Does Active Directory need to communicate with the internet?

      • Routinely audit ingress firewall rules

    • Set script files to open using notepad: Controlling JavaScript Malware Before it Runs

    • Implement hardened images for operating systems and services

    • Implement web or domain filtering

      • Block newly registered domains

      • Block sites and domains that are categorized  as “Malware” or “Suspicious” 

    • Ensure Anti-virus (AV) and Endpoint Detection and Response (EDR) is deployed across all corporate assets and properly functioning and updated

      • Routinely validate proper functionality

    • Implement a security awareness program, at least as it applies to email security as an exceedingly large portion of ransomware campaigns begin via email

      • Training about legitimate communication channels and document sharing platforms 

        • A web page with visual examples can be very helpful

      • What does “suspicious” and/or “malicious” look like?

        • Emails

        • Websites

        • Software

      • Training on how to report suspicious activity/emails

    • Red Canary Specific

      • Set up Automate trigger/playbook to alert on and contain malicious high severity detections. This contains precursors to ransomware 

    Reactive

    • Isolate the affected endpoint/s through Red Canary/EDR platform

    • Remove ransomware artifacts, restore from known-good backups, or re-image the system 

    • Determine root cause to prevent future occurrence

    • If needed, engage your cyber-insurance and get IR services allocated

    • Red Canary specific

      • Setup Automate trigger/playbook to key off of the subcategory Ransomware. This will contain active ransomware activity

    Additionally the CIS top 18 contain steps to a strong foundation and include a lot of what is listed above.

    Additional resources: Prevent mitigate ransomware and Detecting and mitigating ransomware

     


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.