How Researchers Are Fighting Back Against Ransomware

November 22, 2019 | Views: 6251

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

For too long, cybercriminals have been raking in billions of dollars from businesses around the globe through the use of crypto-ransomware. This is a specific type of ransomware that uses encryption technology to ‘scramble’ the data of its victims. The victim is then instructed to pay a ransom, by a specific deadline, to have their data decrypted. The threat is increasing. Global losses have risen from $5 billion in 2017 to an anticipated $11.5 billion by the time 2019 is out. New variants such as Phobos and Ryuk are now making the news with Los Angeles IT Consulting firm DCG Inc. revealing, in a recent blog post, that Phobos increased its prevalence by 940% 1 through 2019. Worrying times!

Begin FREE Malware Threats Course >>

Not only is this level of damage potentially crippling for business and industry, but it also provides funding for organized crime network. Every Bitcoin that a company releases to unlock their sensitive data could find its way into the coffers of those dealing in drugs, weapons, human slavery, and international terrorism. As this article reveals later, even law enforcement organizations have been guilty of paying ransoms to decrypt their data.

Fortunately, there are signs that government agencies, cybersecurity professionals, and academic researchers are mustering a fightback. Most know there is no ‘silver bullet’ that will finally end crypto-ransomware and that a multi-level, perhaps multi-agency approach is necessary.

The first stage in combating a threat has to be to categorize it. To this end, organizations such as ENISA (European Union Agency for Cybersecurity) have separated ransomware from the morass of general cyberattack methods and devoted resources specifically towards tackling it.

This article looks at some of the academic activity that has supported this approach, namely the efforts to use real case analysis of cyberattacks to create a taxonomy to organize effective ransomware response.

The specific area of focus for this article was a 2019 research project carried out in the UK by the Cybercrime Group at the Center for Criminal Justice Studies, University of Law, Leeds.

Through qualitative research methods, the researchers were able to devise a taxonomy of countermeasures. Which could be used by businesses to shore up their defenses against ransomware attacks.

The study recognized that ransomware’s effectiveness lies somewhere in the muddy ground between human psychology and flawed machines. From 26 ransomware attack case studies, it identified three different attack vectors: malicious emails, brute force attacks, and drive-by downloads. Whereas the first type of attack requires a human error, the other two are down to IT vulnerabilities.

Interviews with those involved in the cyberattack, both as victims and as investigators, were painstakingly transcribed and then analyzed to find common themes. Those failings identified were then turned around into potential action points. These points were grouped into three taxonomies: socio-technical response tools and the enablers of change (front line manager actions and senior management actions).

This article focuses only on the response tools category.

Response tools were further broken down into sub-categories: user security education, technical measures, network security, security policies, secure practices, and the incident response strategy.

In terms of security education, the evidence revealed the need to gradually introduce education to take account of the reduced technical experience and know how of some employees, particularly seniors. Training should include realistic examples and be made relevant to the person taking it by, for example, explaining how their family could be affected by a breach. Regular bulletins and annual exercises would be necessary to keep employees on their toes. It was recognized that creativity might be needed to persuade employees to read the bulletins. For example, one of the victims now releases bulletins with a musical theme to encourage engagement with the documents.

One interesting piece of security education advice to come out of the study was to provide training on a face-to-face basis rather than purely online. With many articles on user security education provided by online training providers, it is not surprising that this message isn’t regularly aired.

Moving on to technical measures and, as expected, a host of recommendations were promoted. To mitigate the risk of employees opening attachments in phishing emails, various types of email hygiene could be implemented. Examples include adding external identifiers to email originating from outside the networks and the manual scanning of all emails containing attachments.

Other technical measures involved patching and upgrade management. Rather than relying on end-users to install patches, these could be centrally-controlled by an IT support team with mandatory patches applied within 24 hours and others within 30 days. Systems should also be upgraded whenever possible, although it was recognized that this might not always be affordable or practical. In this case, mitigation measures would need to be in place. For example, legacy systems could be confined to a subnet or, even better, taken offline altogether.

While countermeasures such as anti-virus (AV) programs and firewalls were deemed necessary, it was accepted that there were different types to choose from. Some recovering victims had benefited from switching from signature-based AV programs to AV solutions, which monitored user behavior and could block connections to unknown IP addresses (e.g., when a piece of malware is ‘phoning home’ for instructions). It was also pointed out that cloud-based AV products were automatically updated and used less local processing power than manually installed AVs.

Sophisticated ‘next-gen’ firewalls were also recommended as they could perform in-depth packet inspections and block suspicious IP addresses. However, these would have to be configured correctly to provide their service.

Backup and recovery measures were highlighted for special attention due to the impact of poorly managed backup procedures, failed backups, and vulnerable locally-stored backups. In one case study, the victim had to fire a third-party backup provider because they failed in their duty. In another, involving a law enforcement organization, a failed backup meant that the ransom had to be paid to the frustration of all concerned. There were also cases whereby locally-connected backups were infected along with the original files.

Other technical measures included disabling Flash and the installation of web filters to protect employees from visiting so-called pharming websites. However, this couldn’t prevent drive-by-downloads from genuine websites that had already been infected. It was also an impractical measure in research-intense organizations.

Network security measures were given a sub-category due to their importance in preventing malware from propagating from node to node. Three areas of focus were identified: strengthening network infrastructure, improving access control management, and implementing effective remote desktop protocol (RDP) management.

Security policies and security practices were important categories since some of the case studies involved individuals panicking and trying to solve the problem for themselves rather than seek appropriate help. For example, one victim responded by shutting down the infected computer and then opening up others on the same network to try to find a solution. This led to additional nodes becoming infected.

Finally, the incident response strategy was broken down into three separate plans: the communication plan, the incident response plan itself, and the business continuity plan.

 

Start on a Guided Career Path:

 

Refined, evidence-based, countermeasure taxonomies like these, specifically designed to tackle the ransomware threat, will likely form the backbone of security compliance programs in the future. Until that time, businesses of all sizes would be advised to implement the results of the research for themselves. After all, as stated by DCG Inc. Los Angeles IT Services firm2:

“Ransomware isn’t going away any time soon. Every organization should continue taking ransomware threats seriously or risk becoming the next victim.”

References:
1. https://www.dcgla.com/2019/10/ransomware-business-threat-stay-safe-it-consulting-los-angeles/
2. https://www.dcgla.com/managed-services-los-angeles/

Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 334 / December 14, 2019
How do I Get MTA Certified?
Views: 926 / December 12, 2019
How much does your PAM software really cost?
Views: 1379 / December 10, 2019
How Do I Get into Android Development?
Views: 1757 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel