SlideShare a Scribd company logo
1 of 10
Ransomware: Understanding the threat and
blocking lateral movement
2
Ransomware is a serious problem that starts in
user space and migrates across infrastructure
until an organisation cannot function.
Ransomware is targeted at user workstations
and often uses social engineering to get the user
to initiate the ransomware. System/network
administrators and developers are targeted using
polluted utilities.
This all means that it is very hard to defend the
various perimeters in your infrastructure. You'll
need to rely on full coverage of currently updated
anti-malware on ALL systems that access your
infrastructure - this means not only your staff, but
your contractors, vendors, auditors and any
other third-party granted access.
3
It's generalisation, but there are three 'bands' of
ransomware:
User space: Typically, end-user workstations and laptops.
Often, the ransomware needs no special privileges and
tends to encrypt files normally seen by the user
immediately and asks for the ransom once it has
encrypted documents and images. It will continue to
encrypt whilst the demand banner is up.
System space: The shared IT systems, services and data
that are key to the business operations. This variety of
ransomware uses the underlying file system or device
drivers to encrypt local files. It then infects files migrates
on to user shares. It continues to serve files to the user for
weeks, so that both encryption and infection are well
embedded into the backup cycle. Once the trigger day has
passed the demand banner is shown on all infected
systems. Systems that are returned from an infected
backup will immediately show the demand banner. This is
the most dangerous type of attack.
Pop-up nuisance: This merely pops up a banner over the
entire screen demanding the bitcoin ransom. In reality, it
has done nothing to the file system, it is mostly designed
to fool home users and harvest a little bitcoin as well.
4
Once running, ransomware seeks to infect and
encrypt all the files it can find.
The initial spread of ransomware is limited to
whatever 'patient zero' can access.
Ransomware seeks out network file shares
which means other users can pick up the
infection thus causing the spread.
5
There are two important factors here. If 'patient zero'
has administrator rights - they can access a lot more
than a regular user. The second factor is time.
Ransomware generally has a delay so that other
users can get infected and thus increase the reach of
the attack.
Ransomware is a specific type of malware - so anti-
malware tools are the first line of defence. However,
all organisations should realise that 100% coverage
of all workstations is impossible and there are always
new variants that elude anti-malware. Thus, the
second line of defence is vital.
6
In cybersecurity, we first need to know which
data assets are the most important to the
organisation, and which assets if lost would stop
the company from operating.
These then drive our backup policy - given that
we have to take into account that we could be
backing up assets that are already polluted with
ransomware.
Knowledge of the critical assets will also drive
our file sharing and permissions policy. Critical
systems should never use the same file shares
as the general user base
7
Typically, once the ransomware has found the
accounts and data that is most valuable, it will
then hunt out backup systems.
The ransomware could infect the backup files or
even delete the backups. It will lie dormant until
a typical multi-tier backup cycle has completed to
make it hard for the victim to restore their
systems.
It’s only once the backups are compromised that
the attack become active and starts encrypting
data.
8
Multiple layers of protection are needed. As the
starting point for most attacks are user’s
workstations, a good place to start is removing
any standing Local Admin rights as that lets the
malware be installed.
Osirium Privileged Endpoint Management (PEM)
solution does just that – remove local admin
rights, but let users run approved applications
with elevated privileges when needed.
9
Osirium Privileged Access Management (PAM) is
the “virtual air gap” that prevents ransomware
spreading from infected workstations to critical
infrastructure such as backup management
systems.
Using automation as an insulating layer between
users and critical systems is by far the safest
long-term protection. Osirium Automation (built
on Osirium’s PPA platform) wraps processes as
a series of tasks run on a secure appliance on
the requesting user’s behalf. This is the best
separation you can get.
The combination of PEM, PAM and PPA from
Osirium creates a series of security cells around
your systems that help prevent lateral movement
of Ransomware from the user's workstations to
your more critical systems.
10
Osirium offer a special bundle of access
management to protect backup systems from
Ransomware, known as Osirium Fast Protect.
It protects up to 10 devices for 3 years and
includes professional services to get the service
running fast.
A special, time-limited offer makes this protection
available for just £4,995.
To get protect your infrastructure and critical data
against ransomware attacks, visit
https://www.osirium.com/osirium-fast-protect.

More Related Content

What's hot

What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemClickSSL
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryBright Technology
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...ClearDATACloud
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowIBM Security
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?The TNS Group
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Storage Switzerland
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackAvanzo net
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomwareCharles Steve
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomwareRaghavendra P.V
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against RansomwareKevo Meehan
 

What's hot (20)

What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware
RansomwareRansomware
Ransomware
 
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
5 Ways to Protect Your Healthcare Organization from a Ransomware Attack - HIM...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?Distribution Industry: What is Ransomware and How Does it Work?
Distribution Industry: What is Ransomware and How Does it Work?
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
 
Ransomware
RansomwareRansomware
Ransomware
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Technical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attackTechnical guidance to prevent wanna cry ransomware attack
Technical guidance to prevent wanna cry ransomware attack
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
Cisa ransomware guide
Cisa ransomware guideCisa ransomware guide
Cisa ransomware guide
 
Defend Your Company Against Ransomware
Defend Your Company Against RansomwareDefend Your Company Against Ransomware
Defend Your Company Against Ransomware
 

Similar to Preventing lateral spread of ransomware

Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESKatherine Duffy
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptxSonuRoy30
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfPriyank40
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-RansomwareDave Augustine
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile AttackIRJET Journal
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention GuideBrian Honan
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaperhanniw79
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 

Similar to Preventing lateral spread of ransomware (20)

Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICESRansomware Response Guide IBM INCIDENT RESPONSE SERVICES
Ransomware Response Guide IBM INCIDENT RESPONSE SERVICES
 
CYBER CRIME.pptx
CYBER CRIME.pptxCYBER CRIME.pptx
CYBER CRIME.pptx
 
cybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdfcybercrime-221128115730-fe6cd22c.pdf
cybercrime-221128115730-fe6cd22c.pdf
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
The Rise of Ransomware
The Rise of RansomwareThe Rise of Ransomware
The Rise of Ransomware
 
Mitppt
MitpptMitppt
Mitppt
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-Ransomware
 
Unit 7
Unit 7Unit 7
Unit 7
 
Ransomeware : A High Profile Attack
Ransomeware : A High Profile AttackRansomeware : A High Profile Attack
Ransomeware : A High Profile Attack
 
Ransomware Prevention Guide
Ransomware Prevention GuideRansomware Prevention Guide
Ransomware Prevention Guide
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Protection and security
Protection and securityProtection and security
Protection and security
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Application security
Application securityApplication security
Application security
 
Ch19
Ch19Ch19
Ch19
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Unit - 5.ppt
Unit - 5.pptUnit - 5.ppt
Unit - 5.ppt
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
Malicious
MaliciousMalicious
Malicious
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Preventing lateral spread of ransomware

  • 1. Ransomware: Understanding the threat and blocking lateral movement
  • 2. 2 Ransomware is a serious problem that starts in user space and migrates across infrastructure until an organisation cannot function. Ransomware is targeted at user workstations and often uses social engineering to get the user to initiate the ransomware. System/network administrators and developers are targeted using polluted utilities. This all means that it is very hard to defend the various perimeters in your infrastructure. You'll need to rely on full coverage of currently updated anti-malware on ALL systems that access your infrastructure - this means not only your staff, but your contractors, vendors, auditors and any other third-party granted access.
  • 3. 3 It's generalisation, but there are three 'bands' of ransomware: User space: Typically, end-user workstations and laptops. Often, the ransomware needs no special privileges and tends to encrypt files normally seen by the user immediately and asks for the ransom once it has encrypted documents and images. It will continue to encrypt whilst the demand banner is up. System space: The shared IT systems, services and data that are key to the business operations. This variety of ransomware uses the underlying file system or device drivers to encrypt local files. It then infects files migrates on to user shares. It continues to serve files to the user for weeks, so that both encryption and infection are well embedded into the backup cycle. Once the trigger day has passed the demand banner is shown on all infected systems. Systems that are returned from an infected backup will immediately show the demand banner. This is the most dangerous type of attack. Pop-up nuisance: This merely pops up a banner over the entire screen demanding the bitcoin ransom. In reality, it has done nothing to the file system, it is mostly designed to fool home users and harvest a little bitcoin as well.
  • 4. 4 Once running, ransomware seeks to infect and encrypt all the files it can find. The initial spread of ransomware is limited to whatever 'patient zero' can access. Ransomware seeks out network file shares which means other users can pick up the infection thus causing the spread.
  • 5. 5 There are two important factors here. If 'patient zero' has administrator rights - they can access a lot more than a regular user. The second factor is time. Ransomware generally has a delay so that other users can get infected and thus increase the reach of the attack. Ransomware is a specific type of malware - so anti- malware tools are the first line of defence. However, all organisations should realise that 100% coverage of all workstations is impossible and there are always new variants that elude anti-malware. Thus, the second line of defence is vital.
  • 6. 6 In cybersecurity, we first need to know which data assets are the most important to the organisation, and which assets if lost would stop the company from operating. These then drive our backup policy - given that we have to take into account that we could be backing up assets that are already polluted with ransomware. Knowledge of the critical assets will also drive our file sharing and permissions policy. Critical systems should never use the same file shares as the general user base
  • 7. 7 Typically, once the ransomware has found the accounts and data that is most valuable, it will then hunt out backup systems. The ransomware could infect the backup files or even delete the backups. It will lie dormant until a typical multi-tier backup cycle has completed to make it hard for the victim to restore their systems. It’s only once the backups are compromised that the attack become active and starts encrypting data.
  • 8. 8 Multiple layers of protection are needed. As the starting point for most attacks are user’s workstations, a good place to start is removing any standing Local Admin rights as that lets the malware be installed. Osirium Privileged Endpoint Management (PEM) solution does just that – remove local admin rights, but let users run approved applications with elevated privileges when needed.
  • 9. 9 Osirium Privileged Access Management (PAM) is the “virtual air gap” that prevents ransomware spreading from infected workstations to critical infrastructure such as backup management systems. Using automation as an insulating layer between users and critical systems is by far the safest long-term protection. Osirium Automation (built on Osirium’s PPA platform) wraps processes as a series of tasks run on a secure appliance on the requesting user’s behalf. This is the best separation you can get. The combination of PEM, PAM and PPA from Osirium creates a series of security cells around your systems that help prevent lateral movement of Ransomware from the user's workstations to your more critical systems.
  • 10. 10 Osirium offer a special bundle of access management to protect backup systems from Ransomware, known as Osirium Fast Protect. It protects up to 10 devices for 3 years and includes professional services to get the service running fast. A special, time-limited offer makes this protection available for just £4,995. To get protect your infrastructure and critical data against ransomware attacks, visit https://www.osirium.com/osirium-fast-protect.

Editor's Notes

  1. An overview of how ransomware infects IT, moves lateral around networks to discover the most valuable accounts and data, then infects or destroys backups. How to protect against such attacks and use Osirium privileged access management, automation and endpoint management as the best defence against ransomware attacks. Also the special offer for Osirium Fast Protect to get started with ransomware defence as quickly as possible.
  2. https://www.osirium.com/pem
  3. https://www.osirium.com/privileged-access-management https://www.osirium.com/automation
  4. https://www.osirium.com/osirium-fast-protect