SlideShare a Scribd company logo
1 of 12
ITPG Secure on
WannaCry‘
Malware Attack
WannaCry – Addressing the
Unprecedented Global
Ransomware Attackhttps://itpgsecure.com
The facts about WannaCry
On Friday, May 12, a ransomware variant titled “WannaCry” infiltrated several UK-based
National Health Service locations. Since then, it has spread across 200 countries and infected
more than 200,000 endpoints.
Microsoft has since released a patch to fix legacy operating systems
(Windows XP and onward). While a patch to remove the underlying
vulnerability (Windows Vista and onward) had been issued on March 14, delays
in applying security updates, and lack of support by Microsoft for legacy
Windows versions have left users vulnerable.
WannaCry is a ransomware variant that leverages a known Microsoft SMB
vulnerability – EternalBlue – targeting unpatched Windows operating systems
(Windows XP, 8, Vista, 7, 2012, 10, and Server 2003). Infected users
experience file encryption in exchange for a $300 bitcoin ransom. The malware
has been documented propagating laterally, rapidly infecting affiliated endpoints.
A short-term “kill-switch” was identified that prevented the infection of
additional systems. Since then, new variants of the malware, which lack the
kill-switch, have been reported. As of May 15, 2017, the threat is still
prevalent and at large.
1
2
3
WannaCry is the result of the recent leaked
NSA arsenal of exploits and tools by the
ShadowBrokers.
WannaCry details and misconceptions
Important information is getting lost amongst the online clutter – take the
time to eliminate all WannaCry misconceptions.
• The most common WannaCry variant uses IPC$ shares and SMB resources to propagate.
• WannaCry leverages the exploit EternalBlue – the vulnerability drops an executable onto the
targeted system and conducts a beacon check for the kill-switch domain. If it doesn’t receive a
response, then the malware executes the ransomware routines. See Endgame.com for more
detailed information.
• WannaCry installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery
harder. (Source: Malwarebytes)
• On the LAN, it scans for all enumerated addresses within its LAN with an open port 445 & 139
(i.e. the SMB port).
• On the internet, it scans for random IP addresses to see if it has an open port 445. If it finds one
with an open port, it scans all devices in the same /24 IP range (i.e. IP addresses that share the
first three octets) as the found address.
• WannaCry kills SQL Server, Exchange, MySQL and installs TOR on the endpoint.
• When the ransom demand-time elapses, the malware writes up to 1GB of free space on host-
disk and then deletes the file.
• A variant of WannaCry has been previously documented before this instance.
For more information,
please visit:
https://gist.github.com/rain-
1/989428fa5504f378b993ee6efbc0b168
https://www.endgame.com/blog/wcrywana
cry-ransomware-technical-analysis
https://www.malwaretech.com/2017/05/ho
w-to-accidentally-stop-a-global-cyber-
attacks.html
https://www.bleepingcomputer.com/news/s
ecurity/with-the-success-of-wannacry-
imitations-are-quickly-in-development/
Immediate actions – If you have
not been infected
Action Actions
Patch or
Inoculate OS
 Determine your exposure and the potential risk implications – identify and document outdated windows operating systems. Update all
legacy software with the recent Microsoft patch. Update supported software with Microsoft’s March 2017 patch.
Back Up Your
Data
 Make the time to back up all critical data to the cloud and/or to an external hard drive.
 Create an image of your current operating system to prevent future data loss.
Disable Unused
Ports
 Assess your organizational exposure for all internet-facing devices. Maintain a dynamic and frequently updated listing of active ports.
 Close all unnecessary ports and adopt the principle of least privilege. Disable legacy protocol such as SMBv1.
Communicate  Send internal alerts to educate employees on the WannaCry threat campaign.
 Deliver security training sessions on threat mitigation tactics; foster a culture of organizational situational awareness.
 Send external alerts to clientele; proactively address any efforts undertaken to combat the threat.
 Schedule cadence meetings with your managed service providers and third-party vendors to discuss WannaCry. Address any/all
corresponding security measures they have undertaken to combat it.
 Share this intelligence and actively collaborate with external stakeholders to manage any potential risk.
 Enterprises can demand proof of change from vendors by asking for evidence such as records of change, patches deployed, etc.
Threat
Intelligence
 Review your threat intelligence program (if there are none, refer to Info-Tech for guidance on setting them up) and ensure that they
are being consumed and actioned. Timely intelligence can give you a crucial head start against threat actors.
Endpoint
Protection
 Install EPP vendor updates. Ensure endpoint protection solutions incorporate the most recent indicators of compromise and updated
signature lists. Adopt machine learning and heuristic-based analysis to monitor threats in real-time.
Leverage IOCs  Organizations should block all connections to TOR nodes.
 Block relevant indicators of compromise. Reference the appendix for a comprehensive list of IOCs.
Incident
Response
 Formalize incident response procedures. Create detailed runbooks that actively address all mitigation and operational procedures in
the event that an endpoint is infected. Actively distribute runbooks and collaborate internally so that all security members are aware
of the required steps and procedures.
Immediate actions – If you have
not been infected
Action
Shut Down  Shut down and disconnect any infected systems as part of your overall risk mitigation strategy.
 Isolate the infected host if available.
 Do not attempt to clean the system or run any AV or malware scans. These processes are done later.
 Assess your organizational exposure for all internet-facing devices. Determine why open ports are open. Maintain a dynamic and frequently
updated listing of active ports.
 Close all unnecessary ports (disable SMBv1) and adopt the principle of least privilege.
Don’t Pay  After evaluating all possible outcomes – if you become infected, payment should not be an option.
Analyze the Scope  Determine exactly how much of your network has been infected and how many files have been compromised.
 Identify any connected devices that had access to the infected device. Create an inventory of infected devices so you know what must be
restored from backup.
 For each connected device, check for signs of infection, e.g. perform a file scan for encryption, file rename spikes, or other signs of
ransomware.
Communicate  Report your experience: organizations that have fallen victim to a ransomware attack are encouraged to work with their local law
enforcement office. US-based companies should report the incident to the FBI Internet Crime Complaint Center (IC3).
 Send internal alerts to educate employees on the WannaCry threat campaign.
 If client-facing operations have been impacted, work with your legal or field department to communicate to your customers. Proactively
address any efforts undertaken to combat the threat.
Locate Backups
and Restore Data
 Google Drive, Dropbox, OneDrive – have you shared the data with someone else using a cloud-based storage service? Even if the data is
encrypted, these services will often allow you to revert your files to a previous state.
 Removable media – did you put the files onto a USB, external hard drive, DVD, or some other removable media to transfer the data? If you
find you have copies on removable media, then manually verify the files by restoring to a separate computer. It is essential to verify the files if
using physical media, as these can tend to deteriorate.
A cost-benefit analysis can easily tell you what you should
do when it comes to ransomware
We live in the real world and often we work for companies looking to maximize their profits. It is practical for them to perform a risk-based cost
benefit analysis to determine whether to pay or not. To pay or not should be a business decision based on which option is most cost effective.
Consider these variables:
• What is the potential harm caused from losing that data or system? Is the data or system critical in nature? What is the potential impact to
the information system, the business process, or the organization? Are there adequate backups and a recovery process to minimize
operational interruptions?
• What is the relative cost associated with paying? Most ransom demands are meant to be reasonable to incite you to pay.
• What is the probability that your data will be decrypted? An “unethical” extortionist could receive payment and choose not to decrypt your
data.
• What is the probability that once you pay, you may be extorted in the future? An attacker could leave malware on your systems in the form
of a backdoor, which they could use to compromise you for additional ransom. An attacker could also spread the knowledge that you are
willing to pay, inciting other cybercriminals to attack you.
DON’T PAY: For most cases, paying the ransom does not make sense. It is the unequivocal recommendation from authorities,
vendors, and Info-Tech that you do not pay unless absolutely necessary.
These considerations result in the conclusion:
Best practices moving forward
Just because a patch is available does not mean it has been deployed. Many organizations run a few patching cycles behind. Conduct an inventory of current
operating systems and immediately patch vulnerable endpoints. Stay up to date with your patching efforts, and ensure other vulnerability management practices
(e.g. hardening, virtual patching, system isolation) are in place where appropriate.
Backup Your Data
Leverage Threat
Intelligence
Patching
≠
Security
Take a proactive approach to vulnerability identification. Leverage third-party open-source vendor websites and mailing lists to actively search for new indicators of
compromise and CVEs. Schedule regular scans and prioritize your patching efforts.
Drive Adoption
Assess Port Security Assess port security and exposure of internet-facing services related to affected RDP and SMB services. Standard ports include 139 and 445. Consider disabling
unused legacy protocol such as SMBv1.
Use this release as leverage not only to create organizational situational awareness around security initiatives, but also to drive adoption of foundational security
measures such as patch management, threat intelligence, and zero-day mitigation policies, procedures, and solutions.
Get in the habit of periodically backing up all sensitive data. Whether through cloud-based solutions or via external hard drives, sensitive data must be frequently
backed up and stored in a secure manner.
Plan For The Worst Formalize incident response procedures. Create detailed runbooks that actively address all mitigation and operational procedures in the event that an endpoint is
infected. Actively distribute runbooks and collaborate internally so that all security members are aware of the required steps and procedures.
Block Indicators
Information alone is not actionable. A successful security program contextualizes threat data, aligns intelligence with business objectives, and then builds processes
to satisfy those objectives. Actively block indicators and act on gathered intelligence.
Maintain a holistic security program
Respond
Analyze
Detect
Prevent
WannaCry is a good reminder that security threats are often unknown and unpredictable. The only way to maintain
effective defense is through a comprehensive and flexible security program.
Prevent: Defense in depth is the
best approach to protect against
unknown and unpredictable
attacks. Effective anti-malware,
diligent patching and
vulnerability management, and
strong human-centric security
are essential.
Detect: There are two types of
companies – those who have
been breached and know it, and
those who have been breached
and don’t know it. Ensure that
monitoring, logging, and event
detection tools are in place and
appropriate to your
organizational needs.
Analyze: Raw data without
interpretation cannot improve
security, and is a waste of time,
money, and effort. Establish a
tiered operational process that
not only enriches data but
provides visibility into your
threat landscape.
Respond: Organizations can’t
rely on an ad hoc response
anymore – don’t wait until a
state of panic. Formalize your
response processes in a detailed
incident runbook in order to
reduce incident remediation
time and effort.
Use this opportunity to conduct a security program evaluation
Integrate Threat
Intelligence Into Your
Security Operations
Humanize The Security
Awareness & Training
Program
Leverage Info-Tech’s various security
blueprints:
Enhance your organizational security posture
• Risk reduction
• Enhanced compliance management
• Improved organizational situational awareness
Create and clarify accountability and responsibility
• Formalized role and process responsibility
• Enhanced internal and external communication
Control security costs
• Incident reduction
• Streamlined security operations processes
• Strategy alignment
Identify opportunities for improvement
• Defined measurement programs
• Defined opportunities for continuous improvement
Effective information security management will help you:
Improve threat protection
• Intelligence-driven security operations process
• Optimized patch management program
• Improved effectiveness of internal controls
• Standardized operational use cases
Develop and Implement a
Security Incident
Management Program
Design and Implement a
Vulnerability
Management Program
Defend Against
Ransomware
Appendix* Indicators of Compromise
• Attached is a list of indicators of compromise issued by US-CERT (as of May 15, 2017). Take the time to ingest and
actively block indicators within all security controls.
Appendix* File Types
There are a number of files and folders WannaCry will avoid. Some because it’s entirely pointless and others because it might destabilize the
system. During scans, it will search the path for the following strings and skip over if present:
•"Content.IE5"
•"Temporary Internet Files"
•" This folder protects against ransomware. Modifying it will reduce protection"
•"Local SettingsTemp"
•"AppDataLocalTemp"
•"Program Files (x86)"
•"Program Files"
•"WINDOWS"
•"ProgramData"
•"Intel"
•"$“
The filetypes it looks for to encrypt are:
.doc, .docx, .xls, .xlsx, .ppt, .pptx, .pst, .ost, .msg, .eml, .vsd, .vsdx, .txt, .csv, .rtf, .123, .wks, .wk1, .pdf, .dwg, .onetoc2, .snt, .jpeg, .jpg, .docb,
.docm, .dot, .dotm, .dotx, .xlsm, .xlsb, .xlw, .xlt, .xlm, .xlc, .xltx, .xltm, .pptm, .pot, .pps, .ppsm, .ppsx, .ppam, .potx, .potm, .edb, .hwp, .602, .sxi,
.sti, .sldx, .sldm, .sldm, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .bz2, .tbk, .bak, .tar, .tgz, .gz, .7z, .rar, .zip, .backup, .iso, .vcd, .bmp, .png, .gif, .raw,
.cgm, .tif, .tiff, .nef, .psd, .ai, .svg, .djvu, .m4u, .m3u, .mid, .wma, .flv, .3g2, .mkv, .3gp, .mp4, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf,
.wav, .mp3, .sh, .class, .jar, .java, .rb, .asp, .php, .jsp, .brd, .sch, .dch, .dip, .pl, .vb, .vbs, .ps1, .bat, .cmd, .js, .asm, .h, .pas, .cpp, .c, .cs, .suo, .sln, .ldf,
.mdf, .ibd, .myi, .myd, .frm, .odb, .dbf, .db, .mdb, .accdb, .sql, .sqlitedb, .sqlite3, .asc, .lay6, .lay, .mml, .sxm, .otg, .odg, .uop, .std, .sxd, .otp, .odp,
.wb2, .slk, .dif, .stc, .sxc, .ots, .ods, .3dm, .max, .3ds, .uot, .stw, .sxw, .ott, .odt, .pem, .p12, .csr, .crt, .key, .pfx, .der
Want to learn more,
joint to our webinar series at
http://cybercast.itpgsecure.com

More Related Content

What's hot

WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowSymantec Security Response
 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareAyoub Rouzi
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomwareOsirium Limited
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptYash Diwakar
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomwareJawhar Ali
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of RansomwareUnitrends
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Roger Hagedorn
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing ThreatNick Miller
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataInderjeet Singh
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedThomas Roccia
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareQualys
 

What's hot (20)

WannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to knowWannaCry ransomware outbreak - what you need to know
WannaCry ransomware outbreak - what you need to know
 
Ransomware
RansomwareRansomware
Ransomware
 
WannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt RansomwareWannaCry / Wannacrypt Ransomware
WannaCry / Wannacrypt Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
Ransomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
seminar report on What is ransomware
seminar report on What is ransomwareseminar report on What is ransomware
seminar report on What is ransomware
 
Take the Ransom Out of Ransomware
Take the Ransom Out of RansomwareTake the Ransom Out of Ransomware
Take the Ransom Out of Ransomware
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
Ransomware: Wannacry
Ransomware: WannacryRansomware: Wannacry
Ransomware: Wannacry
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
Ransomware - The Growing Threat
Ransomware - The Growing ThreatRansomware - The Growing Threat
Ransomware - The Growing Threat
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
Wannacry
WannacryWannacry
Wannacry
 
Wannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons LearnedWannacry | Technical Insight and Lessons Learned
Wannacry | Technical Insight and Lessons Learned
 
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry RansomwareHow to Rapidly Identify Assets at Risk to WannaCry Ransomware
How to Rapidly Identify Assets at Risk to WannaCry Ransomware
 

Similar to ITPG Secure on WannaCry

Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesDam Frank
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiHCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiMatthew J McMahon
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017Bret Piatt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Cengage Learning
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareDavid Sweigert
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...MohamedOmerMusa
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Tiffany Sandoval
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work GuideEduardo Chavarro
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityLumension
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 

Similar to ITPG Secure on WannaCry (20)

Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed Strategies
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbiHCA 530, Week2, Psa i-091516-ransomware notice from fbi
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
 
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
 
FBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from RansomwareFBI Memo on How to Protect Yourself from Ransomware
FBI Memo on How to Protect Yourself from Ransomware
 
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
Trial Course - CertMaster Learn and CertMaster Labs for Security+ (Exam SY0-6...
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...Attackers May Depend On Social Engineering To Gain...
Attackers May Depend On Social Engineering To Gain...
 
Practical Incident Response - Work Guide
Practical Incident Response - Work GuidePractical Incident Response - Work Guide
Practical Incident Response - Work Guide
 
How To Prevent Ransomware
How To Prevent RansomwareHow To Prevent Ransomware
How To Prevent Ransomware
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
NetWitness
NetWitnessNetWitness
NetWitness
 
It's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint SecurityIt's Your Move: The Changing Game of Endpoint Security
It's Your Move: The Changing Game of Endpoint Security
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

ITPG Secure on WannaCry

  • 1. ITPG Secure on WannaCry‘ Malware Attack WannaCry – Addressing the Unprecedented Global Ransomware Attackhttps://itpgsecure.com
  • 2. The facts about WannaCry On Friday, May 12, a ransomware variant titled “WannaCry” infiltrated several UK-based National Health Service locations. Since then, it has spread across 200 countries and infected more than 200,000 endpoints. Microsoft has since released a patch to fix legacy operating systems (Windows XP and onward). While a patch to remove the underlying vulnerability (Windows Vista and onward) had been issued on March 14, delays in applying security updates, and lack of support by Microsoft for legacy Windows versions have left users vulnerable. WannaCry is a ransomware variant that leverages a known Microsoft SMB vulnerability – EternalBlue – targeting unpatched Windows operating systems (Windows XP, 8, Vista, 7, 2012, 10, and Server 2003). Infected users experience file encryption in exchange for a $300 bitcoin ransom. The malware has been documented propagating laterally, rapidly infecting affiliated endpoints. A short-term “kill-switch” was identified that prevented the infection of additional systems. Since then, new variants of the malware, which lack the kill-switch, have been reported. As of May 15, 2017, the threat is still prevalent and at large. 1 2 3 WannaCry is the result of the recent leaked NSA arsenal of exploits and tools by the ShadowBrokers.
  • 3. WannaCry details and misconceptions Important information is getting lost amongst the online clutter – take the time to eliminate all WannaCry misconceptions. • The most common WannaCry variant uses IPC$ shares and SMB resources to propagate. • WannaCry leverages the exploit EternalBlue – the vulnerability drops an executable onto the targeted system and conducts a beacon check for the kill-switch domain. If it doesn’t receive a response, then the malware executes the ransomware routines. See Endgame.com for more detailed information. • WannaCry installs the DOUBLEPULSAR backdoor. It corrupts shadow volumes to make recovery harder. (Source: Malwarebytes) • On the LAN, it scans for all enumerated addresses within its LAN with an open port 445 & 139 (i.e. the SMB port). • On the internet, it scans for random IP addresses to see if it has an open port 445. If it finds one with an open port, it scans all devices in the same /24 IP range (i.e. IP addresses that share the first three octets) as the found address. • WannaCry kills SQL Server, Exchange, MySQL and installs TOR on the endpoint. • When the ransom demand-time elapses, the malware writes up to 1GB of free space on host- disk and then deletes the file. • A variant of WannaCry has been previously documented before this instance. For more information, please visit: https://gist.github.com/rain- 1/989428fa5504f378b993ee6efbc0b168 https://www.endgame.com/blog/wcrywana cry-ransomware-technical-analysis https://www.malwaretech.com/2017/05/ho w-to-accidentally-stop-a-global-cyber- attacks.html https://www.bleepingcomputer.com/news/s ecurity/with-the-success-of-wannacry- imitations-are-quickly-in-development/
  • 4. Immediate actions – If you have not been infected Action Actions Patch or Inoculate OS  Determine your exposure and the potential risk implications – identify and document outdated windows operating systems. Update all legacy software with the recent Microsoft patch. Update supported software with Microsoft’s March 2017 patch. Back Up Your Data  Make the time to back up all critical data to the cloud and/or to an external hard drive.  Create an image of your current operating system to prevent future data loss. Disable Unused Ports  Assess your organizational exposure for all internet-facing devices. Maintain a dynamic and frequently updated listing of active ports.  Close all unnecessary ports and adopt the principle of least privilege. Disable legacy protocol such as SMBv1. Communicate  Send internal alerts to educate employees on the WannaCry threat campaign.  Deliver security training sessions on threat mitigation tactics; foster a culture of organizational situational awareness.  Send external alerts to clientele; proactively address any efforts undertaken to combat the threat.  Schedule cadence meetings with your managed service providers and third-party vendors to discuss WannaCry. Address any/all corresponding security measures they have undertaken to combat it.  Share this intelligence and actively collaborate with external stakeholders to manage any potential risk.  Enterprises can demand proof of change from vendors by asking for evidence such as records of change, patches deployed, etc. Threat Intelligence  Review your threat intelligence program (if there are none, refer to Info-Tech for guidance on setting them up) and ensure that they are being consumed and actioned. Timely intelligence can give you a crucial head start against threat actors. Endpoint Protection  Install EPP vendor updates. Ensure endpoint protection solutions incorporate the most recent indicators of compromise and updated signature lists. Adopt machine learning and heuristic-based analysis to monitor threats in real-time. Leverage IOCs  Organizations should block all connections to TOR nodes.  Block relevant indicators of compromise. Reference the appendix for a comprehensive list of IOCs. Incident Response  Formalize incident response procedures. Create detailed runbooks that actively address all mitigation and operational procedures in the event that an endpoint is infected. Actively distribute runbooks and collaborate internally so that all security members are aware of the required steps and procedures.
  • 5. Immediate actions – If you have not been infected Action Shut Down  Shut down and disconnect any infected systems as part of your overall risk mitigation strategy.  Isolate the infected host if available.  Do not attempt to clean the system or run any AV or malware scans. These processes are done later.  Assess your organizational exposure for all internet-facing devices. Determine why open ports are open. Maintain a dynamic and frequently updated listing of active ports.  Close all unnecessary ports (disable SMBv1) and adopt the principle of least privilege. Don’t Pay  After evaluating all possible outcomes – if you become infected, payment should not be an option. Analyze the Scope  Determine exactly how much of your network has been infected and how many files have been compromised.  Identify any connected devices that had access to the infected device. Create an inventory of infected devices so you know what must be restored from backup.  For each connected device, check for signs of infection, e.g. perform a file scan for encryption, file rename spikes, or other signs of ransomware. Communicate  Report your experience: organizations that have fallen victim to a ransomware attack are encouraged to work with their local law enforcement office. US-based companies should report the incident to the FBI Internet Crime Complaint Center (IC3).  Send internal alerts to educate employees on the WannaCry threat campaign.  If client-facing operations have been impacted, work with your legal or field department to communicate to your customers. Proactively address any efforts undertaken to combat the threat. Locate Backups and Restore Data  Google Drive, Dropbox, OneDrive – have you shared the data with someone else using a cloud-based storage service? Even if the data is encrypted, these services will often allow you to revert your files to a previous state.  Removable media – did you put the files onto a USB, external hard drive, DVD, or some other removable media to transfer the data? If you find you have copies on removable media, then manually verify the files by restoring to a separate computer. It is essential to verify the files if using physical media, as these can tend to deteriorate.
  • 6. A cost-benefit analysis can easily tell you what you should do when it comes to ransomware We live in the real world and often we work for companies looking to maximize their profits. It is practical for them to perform a risk-based cost benefit analysis to determine whether to pay or not. To pay or not should be a business decision based on which option is most cost effective. Consider these variables: • What is the potential harm caused from losing that data or system? Is the data or system critical in nature? What is the potential impact to the information system, the business process, or the organization? Are there adequate backups and a recovery process to minimize operational interruptions? • What is the relative cost associated with paying? Most ransom demands are meant to be reasonable to incite you to pay. • What is the probability that your data will be decrypted? An “unethical” extortionist could receive payment and choose not to decrypt your data. • What is the probability that once you pay, you may be extorted in the future? An attacker could leave malware on your systems in the form of a backdoor, which they could use to compromise you for additional ransom. An attacker could also spread the knowledge that you are willing to pay, inciting other cybercriminals to attack you. DON’T PAY: For most cases, paying the ransom does not make sense. It is the unequivocal recommendation from authorities, vendors, and Info-Tech that you do not pay unless absolutely necessary. These considerations result in the conclusion:
  • 7. Best practices moving forward Just because a patch is available does not mean it has been deployed. Many organizations run a few patching cycles behind. Conduct an inventory of current operating systems and immediately patch vulnerable endpoints. Stay up to date with your patching efforts, and ensure other vulnerability management practices (e.g. hardening, virtual patching, system isolation) are in place where appropriate. Backup Your Data Leverage Threat Intelligence Patching ≠ Security Take a proactive approach to vulnerability identification. Leverage third-party open-source vendor websites and mailing lists to actively search for new indicators of compromise and CVEs. Schedule regular scans and prioritize your patching efforts. Drive Adoption Assess Port Security Assess port security and exposure of internet-facing services related to affected RDP and SMB services. Standard ports include 139 and 445. Consider disabling unused legacy protocol such as SMBv1. Use this release as leverage not only to create organizational situational awareness around security initiatives, but also to drive adoption of foundational security measures such as patch management, threat intelligence, and zero-day mitigation policies, procedures, and solutions. Get in the habit of periodically backing up all sensitive data. Whether through cloud-based solutions or via external hard drives, sensitive data must be frequently backed up and stored in a secure manner. Plan For The Worst Formalize incident response procedures. Create detailed runbooks that actively address all mitigation and operational procedures in the event that an endpoint is infected. Actively distribute runbooks and collaborate internally so that all security members are aware of the required steps and procedures. Block Indicators Information alone is not actionable. A successful security program contextualizes threat data, aligns intelligence with business objectives, and then builds processes to satisfy those objectives. Actively block indicators and act on gathered intelligence.
  • 8. Maintain a holistic security program Respond Analyze Detect Prevent WannaCry is a good reminder that security threats are often unknown and unpredictable. The only way to maintain effective defense is through a comprehensive and flexible security program. Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Effective anti-malware, diligent patching and vulnerability management, and strong human-centric security are essential. Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs. Analyze: Raw data without interpretation cannot improve security, and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but provides visibility into your threat landscape. Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook in order to reduce incident remediation time and effort.
  • 9. Use this opportunity to conduct a security program evaluation Integrate Threat Intelligence Into Your Security Operations Humanize The Security Awareness & Training Program Leverage Info-Tech’s various security blueprints: Enhance your organizational security posture • Risk reduction • Enhanced compliance management • Improved organizational situational awareness Create and clarify accountability and responsibility • Formalized role and process responsibility • Enhanced internal and external communication Control security costs • Incident reduction • Streamlined security operations processes • Strategy alignment Identify opportunities for improvement • Defined measurement programs • Defined opportunities for continuous improvement Effective information security management will help you: Improve threat protection • Intelligence-driven security operations process • Optimized patch management program • Improved effectiveness of internal controls • Standardized operational use cases Develop and Implement a Security Incident Management Program Design and Implement a Vulnerability Management Program Defend Against Ransomware
  • 10. Appendix* Indicators of Compromise • Attached is a list of indicators of compromise issued by US-CERT (as of May 15, 2017). Take the time to ingest and actively block indicators within all security controls.
  • 11. Appendix* File Types There are a number of files and folders WannaCry will avoid. Some because it’s entirely pointless and others because it might destabilize the system. During scans, it will search the path for the following strings and skip over if present: •"Content.IE5" •"Temporary Internet Files" •" This folder protects against ransomware. Modifying it will reduce protection" •"Local SettingsTemp" •"AppDataLocalTemp" •"Program Files (x86)" •"Program Files" •"WINDOWS" •"ProgramData" •"Intel" •"$“ The filetypes it looks for to encrypt are: .doc, .docx, .xls, .xlsx, .ppt, .pptx, .pst, .ost, .msg, .eml, .vsd, .vsdx, .txt, .csv, .rtf, .123, .wks, .wk1, .pdf, .dwg, .onetoc2, .snt, .jpeg, .jpg, .docb, .docm, .dot, .dotm, .dotx, .xlsm, .xlsb, .xlw, .xlt, .xlm, .xlc, .xltx, .xltm, .pptm, .pot, .pps, .ppsm, .ppsx, .ppam, .potx, .potm, .edb, .hwp, .602, .sxi, .sti, .sldx, .sldm, .sldm, .vdi, .vmdk, .vmx, .gpg, .aes, .ARC, .PAQ, .bz2, .tbk, .bak, .tar, .tgz, .gz, .7z, .rar, .zip, .backup, .iso, .vcd, .bmp, .png, .gif, .raw, .cgm, .tif, .tiff, .nef, .psd, .ai, .svg, .djvu, .m4u, .m3u, .mid, .wma, .flv, .3g2, .mkv, .3gp, .mp4, .mov, .avi, .asf, .mpeg, .vob, .mpg, .wmv, .fla, .swf, .wav, .mp3, .sh, .class, .jar, .java, .rb, .asp, .php, .jsp, .brd, .sch, .dch, .dip, .pl, .vb, .vbs, .ps1, .bat, .cmd, .js, .asm, .h, .pas, .cpp, .c, .cs, .suo, .sln, .ldf, .mdf, .ibd, .myi, .myd, .frm, .odb, .dbf, .db, .mdb, .accdb, .sql, .sqlitedb, .sqlite3, .asc, .lay6, .lay, .mml, .sxm, .otg, .odg, .uop, .std, .sxd, .otp, .odp, .wb2, .slk, .dif, .stc, .sxc, .ots, .ods, .3dm, .max, .3ds, .uot, .stw, .sxw, .ott, .odt, .pem, .p12, .csr, .crt, .key, .pfx, .der
  • 12. Want to learn more, joint to our webinar series at http://cybercast.itpgsecure.com