The threat from ransomware – and the money cybercriminals are making – has never been greater. Cyberattacks on organizations of all kinds across the world are prolific, up 102% from 2020, with organizations in Asia Pacific seeing the highest number of ransomware attacks – 51 per week, according to Check Point Research. The average ransom demand climbed more than 500% between 2020 and 2021, with the average payout spiking 82% in that period.[1]
Cybercriminals are using increasingly sophisticated tactics like “Double Encryption Attacks” to strengthen the likelihood of ransom payments. In these type of attacks, cybercriminals scan the target organization’s network to identify & exfiltrate sensitive data before encrypting the setup, or in some instances, they also locate and destroy backup files before launching the attack itself. Thus, the organization often has limited options but to pay the ransom since restoration from functional backups has been compromised Furthermore, the hackers also commonly threaten to release sensitive corporate data to the public or Dark Net, even if the organization manages to adequately restore their IT systems.
You Think You’re Protected. But Are You?
For many organizations, despite their investments in IT cybersecurity defenses they are still susceptible to Double Extortion Attacks.
Enterprise IT systems are typically set up to trust, or whitelist, IP addresses and certificates from their preferred suppliers, as this diagram shows:
However, this example of a Supply Chain Attack timeline demonstrates how detection-centric tools will only alert your organization to an attack after it has begun – making it virtually impossible to prevent.
Once they’ve infiltrated the system, hackers typically maintain a very light malware footprint, thus allowing them to avoid detection by most traditional cybersecurity systems.
A new emerging trend in attacks is even more sophisticated, and is called a Triple Extortion Attack. In this situation, attackers will steal sensitive data and parse it to find details about their end customers. Once they are able to identify the sensitive data of high net-worth individuals or companies, the bad actors will demand a ransom from these secondary victim as well, with the threat of leaking their data. The primary victims are then vulnerable not only to direct financial losses, regulatory and negative publicity, but also potential lawsuits from secondary victims whose data was compromised.
Why a Multi-layered Defense is your Best Weapon
In the case of double and triple extortion attacks, ‘prevention’ is significantly better than ‘cure’. Systems that can detect anomalous user activities, as well as scan and system sweeps, are best suited to proactive protect against ransomware.
At Lumen, we’ve learnt that a successful mitigation strategy requires a multi-pronged approach:
- Advanced multi-factor detection
- Predictive analytics
- Threat vector correlation
- Distinguishing between malicious and normal traffic
How can my Organization Achieve a Multi-defense System Approach?
The first weapon in your armory against double threat attacks is awareness and vigilance; if your users are not trained adequately to spot cyberattacks, your organization’s defenses can easily be breached.
To overcome the threat of ransomware, many organizations deploy Endpoint Detection and Response (EDR) solutions, which can detect and prevent attacks that are propagated through phishing vector. While a EDR solutions’ capabilities are able to stop the encryption stage of an attack and roll back the affected endpoint to a healthy state, they are not able to detect network compromise or bad actors lurking within your network. Neither can EDR prevent data exfiltration before the encryption stage of the attack. Automated solutions such as User and Entity Behavioral Analytics (UEBA) are important complementary additions to EDR investments, as UEBA solutions are designed to spot abnormal activities including network scanning and suspicious data extraction. Leveraging a combination of multi-factor and extended threat detection capabilities which looks at network traffic through log correlation, and identifying suspicious user activities such as data exfiltration through UEBA, will enhance an organization’s security posture and risk mitigation.
Finally, security is not something you can simply set and forget. Good cybersecurity defense practice calls for continuous review and recalibration of your policy controls and processes, to ensure your tools can continue to provide the defense your organization needs.
Your Attack Protection Checklist
How many does your organization have in place?
- Regular vulnerability assessment scans and Risk Prioritization
- A Penetration testing exercise conducted at least annually
- Disciplined Patching
- Limiting user privileges (least privilege principle)
- Continuous Security Log Monitoring
- Remote access only through secured channels
- MFA for all users
- A program of continuous cyber awareness education for employees
If you haven’t checked all these boxes, you’re leaving your organization open to attack.
[1] Unit 42 Ransomware Threat Report, 1H 2021 update
[2] Attack landscape update: Ransomware 2.0, automated recon, and supply chain attacks