Ransomware is malware designed to encrypt files on a device, rendering files and the systems that rely on them unusable. Traditionally, malicious actors demand ransom in exchange for decryption. Over time, malicious actors have adjusted their ransomware tactics to be more destructive and impactful. Malicious actors increasingly exfiltrate data and then threaten to sell or leak it—including sensitive or personal information—if the ransom is not paid. These data breaches can cause financial loss to the victim organization and erode customer trust.

All organizations are at risk of falling victim to a ransomware incident and are responsible for protecting sensitive and personal data stored on their systems. The following provides information for all government and private sector organizations, including critical infrastructure organizations, on preventing and responding to ransomware-caused data breaches.

Goliath encourages organizations to adopt a heightened state of awareness and implement the recommendations below.

PREVENTING RANSOMWARE ATTACKS

  • Maintain offline, encrypted backups of data and regularly test your backups. Backup procedures should be conducted on a regular basis. It is important that backups be maintained offline as many ransomware variants attempt to find and delete or encrypt accessible backups.
  • Create, maintain, and exercise a basic cyber incident response plan, resiliency plan, and associated communications plan.
    • The cyber incident response plan should include response and notification procedures for ransomware incidents.
    • The resilience plan should address how to operate if you lose access to or control of critical functions. Goliath offers, cyber resilience assessments to help organizations evaluate their operational resilience and cybersecurity practices.
  • Mitigate internet-facing vulnerabilities and misconfigurations to reduce risk of actors exploiting this attack surface.
    • Employ best practices for use of Remote Desktop Protocol (RDP) and other remote desktop services. Threat actors often gain initial access to a network through exposed and poorly secured remote services and later propagate ransomware.
    • Audit the network for systems using RDP, closed unused RDP ports, enforce account lockouts after a specified number of attempts, apply multi-factor authentication (MFA), and log RDP login attempts.
    • Conduct regular vulnerability scanning to identify and address vulnerabilities, especially those on internet-facing devices.
    • Update software, including operating systems, applications, and firmware, in a timely manner. Prioritize timely patching of critical vulnerabilities and vulnerabilities on internet-facing servers—as well as software processing internet data, such as web browsers, browser plugins, and document readers. If patching quickly is not feasible, implement vendor-provided mitigations.
    • Ensure that devices are properly configured and security features are enabled, e.g., disable ports and protocols that are not being used for a business purpose.
    • Disable or block inbound and outbound Server Message Block (SMB) Protocol and remove or disable outdated versions of SMB.
  • Reduce the risk of phishing emails from reaching end users by:
    • Enabling strong spam filters.
    • Implementing a cybersecurity user awareness and training program that includes guidance on how to identify and report suspicious activity (e.g., phishing) or incidents. Goliath offers a Phishing Campaign Assessment for organizations to support and measure the effectiveness of user awareness training.
  • Practice good cyber hygiene by:
    • Ensuring antivirus and anti-malware software and signatures are up to date.
    • Implementing application allowlisting.
    • Ensuring user and privileged accounts are limited through account use policies, user account control, and privileged account management.
    • Employing MFA for all services to the extent possible, particularly for webmail, virtual private networks (VPNs), and accounts that access critical systems.
    • Implementing cybersecurity best practices

PROTECTING SENSITIVE AND PERSONAL INFORMATION 

Organizations storing sensitive or personal information of customers or employees are responsible for protecting it from access or exfiltration by malicious cyber actors.

Goliath recommends that organizations:

  • Know what personal and sensitive information is stored on your systems and who has access to it. Limit the data by only storing information you need for business operations. Ensure data is properly disposed of when no longer needed. 
  • Implement physical security best practices.
  • Implement cybersecurity best practices by:
    • Identifying the computers or servers where sensitive personal information is stored. Note: do not store sensitive or personal data on internet-facing systems or laptops unless it is essential for business operations. If laptops contain sensitive data, encrypt them and train employees on proper physical security of the device.
    • Encrypting sensitive information at rest and in transit.
    • Implementing firewalls to protect networks and systems from malicious or unnecessary network traffic.
    • Considering applying network segmentation to further protect systems storing sensitive or personal information.
  • Ensure your cyber incident response and communications plans include response and notification procedures for data breach incidents. Ensure the notification procedures adhere to applicable state laws.

RESPONDING TO RANSOMWARE-CAUSED DATA BREACHES 

Should your organization become a victim of a ransomware incident and associated data breach, Goliath strongly recommends implementing your cyber incident response plan and taking the following actions.

  • Secure network operations and stop additional data loss by using the following checklist, moving through the first three steps in sequence. 
    • Determine which systems were impacted and immediately isolate them. If several systems appear impacted, take the network offline at the switch level. If taking the network temporarily offline is not immediately possible, locate the network (e.g., Ethernet) cable and unplug affected devices from the network or remove them from Wi-Fi to contain the infection. 
    • If—and only if—affected devices cannot be removed from the network or the network cannot be temporarily shut down, power infected devices down to avoid further spread of the ransomware infection. Note: this step should be carried out only if necessary because it may result in the loss of infection artifacts and potential evidence stored in volatile memory. 
    • Triage impacted systems for restoration and recovery. Prioritize based on criticality. 
    • Confer with your team to develop and document an initial understanding of what has occurred based on preliminary analysis.
    • Engage your internal and external teams and stakeholders to inform them of how they can help you mitigate, respond to, and recover from the incident. Strongly consider requesting assistance from Goliath’s incident response team.
  • If no initial mitigation actions appear possible, take a system image and memory capture of a sample of affected devices. Additionally, collect any relevant logs as well as samples of any “precursor” malware binaries and associated observables or indicators of compromise. Note: do not destroy forensic evidence, and take care to preserve evidence that is highly volatile in nature—or limited in retention—to prevent loss or tampering.
  • Follow notification requirements as outlined in your cyber incident response plan.
    • If personal information stored on behalf of other businesses is stolen, notify these businesses of the breach.
    • If the breach involved personally identifiable information, notify affected individuals so they can take steps to reduce the chance that their information will be misused. Tell people the type of information exposed,recommend actions, and provide relevant contact information.
    • If the breach involved electronic health information, you may need to notify the FTC or the Department of Health and Human Services, and, in some cases, the media.
  • Report the incident to your local Federal Bureau of Investigation (FBI) field office, the FBI Internet Crime Complaint Center, or your local U.S. Secret Service office.

Categories:

Comments are closed

Popular Categories