Uploaded on Mar 17, 2022
Ransomware has been the most significant threat for years which has been affected over sectors and remained one of the top risks. The topics covered in the webinar are detailed in this blog for reference.
Ransomware- A Reality Check (Part 2)
Ransomware- A Reality Check (Part 2)
www.infosectrain.com | [email protected]
www.infosectrain.com | [email protected]
Ransomware- A reality check (Part 1)
Ransomware- A reality check (Part 2)
Ransomware- A reality check (Part 3)
www.infosectrain.com | [email protected]
Variants of Ransomware
Bad Rabbit: It was distributed by a fake Adobe Flash update on a corrupt website.
Fake Adobe Flash update; once it is downloaded, your data has been compromised.
Crypto wall: Malware hides in your zip files and other email attachments, and then it
makes its way to your devices. Once you install them, it tries to find java
vulnerabilities to encrypt or withhold your data.
Patia: It is a crypto-ransomware that targets your Windows servers, laptops, or PC and
mostly takes advantage of SMB (Server Message Block) and tries to steal your
credentials and spread them into your machine.
Wanna cry: It was first seen in a large-scale crypto-ransomware attack in 2017. It
affected almost a quarter-million machines internationally, and it spreads through
your windows operating system.
Black Byte: It is a notorious variant that compromised multiple US and foreign
businesses, including three critical US infrastructure sectors. It encrypts your files and
compromises the Windows host system, including physical and virtual servers.
www.infosectrain.com | [email protected]
Countermeasures
The following are the countermeasures or defense mechanisms to be implemented to ensure
safe data transfer:
www.infosectrain.com | [email protected]
Using Firewall to its fullest capability
Firewalls are the most reliable. If a firewall does not allow a malicious web
request or an email security gateway has been implemented, then the users will
not get any malicious attacks or emails. But if the firewall fails, there should be
backup plans.
Log4j attack: Log4j vulnerability, an Apache web server, has been exploited in
the wild by executing games and transforming from exploiting the game servers
to the actual corporate servers.
User Education
For example, if an email passes through an email security gateway and firewall,
and if the user is unaware of potential phishing emails, it develops the attack
surface.
Kevin Mitnick, the most notorious hacker, started phishing the telephone, and
the FBI searched for him a lot. There is training from this company called
KnowBe4 that makes the user aware of phishing and how to identify emails
received from an unsuspected user.
www.infosectrain.com | [email protected]
Disabling Macros execution
Now the execution of macros is the popular one where people get
exploited. For example, a malicious document is attached to a mail
received by the user unaware of it and thinks it is legitimate. He then
opens the documents, and therefore the macros get enabled in the
organization if he uses the organization network.
Macros are small code blocks that get executed automatically in the
background, primarily when an office application is based on a visual basis.
These codes are written to exploit any existing vulnerabilities in the
computers.
www.infosectrain.com | [email protected]
Implement Web security
The Cross-site scripting attack- suppose your browser is vulnerable to any particular
attack. These types of vulnerabilities of the browsers are exploited by visiting any
malicious website.
There’s a well-known chef Jamie Oliver, whose website was vulnerable. As everyone
visiting his website had downloaded the malicious code in the background. To
overcome such malicious code, every organization should implement WAF rules and
disable adblock.
www.infosectrain.com | [email protected]
Incorporate least privilege policy
Rule-based access control and our backup is most important. The privileged
access to people only to perform the activity, not the full access, is part of a
defense-in-depth strategy.
Network Segmentation
The HR Department is the one who receives more external emails document or
PDF files when compared to the software development department. Do you think
both guys should work on the same network to implement high security?.
If HR receives a malicious email and clicks, the malware starts spreading in the
environment. For example, Wipro was part of the MSSP attack. A supply chain
attack has been infected because some other team had clicked some URL that led
people to come into the network. If they had segmented their network, they
would have prevented it.
www.infosectrain.com | [email protected]
Active monitoring
Security Analyst Security Operation Center (SOC) monitors 24/7 alerts. They look
to modify and identify the attacks. For example, when they figured out that log4j
was being exploited by 3000 times of log4j attempts, they implemented alerts and
security measures to block the attempt and notify us. That helps to take further
steps and investigate that particular source or IP address.
Action Plan
It’s not about how you will be attacked; it’s about when you will be attacked. Even
organizations with high security are compromised, and an Action plan helps in this
case.
A clear and detailed action plan of what to do and how to do it when an attack
occurs includes the most practical and effective countermeasure to implement
quickly.
www.infosectrain.com | [email protected]
About InfosecTrain
• Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
• Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
• High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | [email protected]
Our Endorsements
www.infosectrain.com | [email protected]
Why InfosecTrain Global Learning Partners
Certified and Flexible modes Access to the
Experienced Instructors of Training recorded
sessions
Post training Tailor Made
completion Training
www.infosectrain.com | [email protected]
Our Trusted Clients
www.infosectrain.com | [email protected]
Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-221-
1127 / UK : +44 7451 208413
[email protected]
www.infosectrain.com
Comments