PID Perspectives

How to protect your business from ransomware

Person working on a laptop computer that has been seized by a ransomware cyber attack. hacked virus

Ransomware has become one of the most pervasive and costly threats to businesses worldwide. In 2023 alone, North American companies faced over $1 billion in ransomware payouts, with global costs estimated to reach $265 billion annually by 2031. However, ransomware attacks can be prevented. This guide provides actionable steps to safeguard your organization from ransomware and build long-term resilience against cyber threats.

What is Ransomware?

Ransomware is malicious software (malware) designed to block access to a system, network, or data by encrypting it until a ransom is paid. Cybercriminals often demand payment in cryptocurrency to ensure anonymity. Ransomware attacks can cause significant financial, operational, and reputational damage to businesses. 

Typically, there are two types of ransom schemes: 

  1. Loss: the cybercriminal holds your data hostage and threatens not to return it until the ransom is paid. 
  2. Breach: the cybercriminal holds your data hostage and threatens to make it public and release it to the world if the ransom is not paid. 

Technically, ransomware attacks can be perpetrated in several ways. Cybercriminals can exploit system or protocol vulnerabilities or send phishing emails. Some of the most infamous ransomware malware are WannaCry, Petya/NotPetya, LockBit, Ryuk, Conti, REvil, DarkSide, and Maze. Many of these have been around for almost a decade and continue to spread. 

Ransomware is a widespread attack because the amount asked for the ransom is generally cheaper than the costs of interrupting operations and having a security team restore your data. 

How does a ransomware attack happen?

Ransomware typically infiltrates a system through the following vectors:

  1. Phishing Emails: Malicious attachments or links sent via deceptive emails.

  2. Drive-by Downloads: Automatic downloads from compromised or malicious websites.

  3. Remote Desktop Protocol (RDP) Exploits: Unauthorized access via weak or stolen RDP credentials.

  4. Software Vulnerabilities: Exploiting unpatched software or outdated operating systems.

  5. Infected USB Drives: Physical media containing malware.

In the video below, you can see what a ransomware attack looks like. When the system is compromised, a ransomware request pops up, with instructions to pay the ransom (typically via cryptocurrencies) and a link for the payment. Cybercriminal organizations often have a business-like setup, with call centers and support teams to help infected users pay and unlock their data with an unencryption key.  

How to respond to a ransomware attack

Early detection of a ransomware attack and swift containment can mitigate its impact. Unusual or encrypted file extensions, suspicious user behaviour, and unexpected network traffic spikes are common indicators of compromise (IoC). 

As you detect a problem, disconnect infected devices from the network immediately to prevent the malware from spreading further. Communication is also critical: immediately inform your IT teams, leadership, and legal representative.

If ransomware infiltrates your systems, take the following steps:

  1. Do Not Pay the Ransom: Paying does not guarantee data recovery and encourages further attacks.

  2. Identify the Strain: Use free online tools (e.g., ID Ransomware) to identify the ransomware type.

  3. Restore from Backups: If backups are secure and unaffected, use them to restore operations.

  4. Engage Professionals: Hire cybersecurity experts to assess and clean the environment. Report the attack to relevant authorities and regulatory bodies.

  5. Communicate Transparently: Inform affected stakeholders and customers with transparent and honest updates.

Why paying RansomWare is not a good idea

When your systems are locked and the amount requested seems reasonable, it’s easy to think that paying the ransom is the best option. However, that’s a bad idea. 

Cybercriminals may or may not provide you with the decryption key after you pay. Even if you regain access, the ransomware may leave backdoors for future attacks. Furthermore, once a company pays, attackers may flag it as a “payer,” making it a target for additional ransomware or other cybercrime. Paying ultimately undermines your negotiating power.

Once you have been infected, your data is already compromised: even if you recover encrypted files, attackers may have exfiltrated sensitive data.

While paying ransomware is not illegal, it might result in sanctions. For example, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) warns against paying ransoms to sanctioned groups, as it may breach economic sanctions. Some jurisdictions impose legal obligations on businesses to report ransomware attacks. Paying without reporting may lead to additional legal scrutiny. 

Long-Term Strategies

To build resilience against future attacks, consider the following:

  1. Adopt Zero Trust Architecture: Treat every access request as a potential threat, verifying every user and device.

  2. Conduct Regular Risk Assessments: Evaluate and address vulnerabilities in your security posture periodically.

  3. Engage in Threat Intelligence Sharing: Collaborate with industry groups and share insights to stay informed about emerging threats.

  4. Invest in Cyber Insurance: Ensure your business has adequate coverage for financial losses related to cyber incidents.

How to prevent ransomware attacks

Proactively protecting your business from ransomware attacks remains the best option. This involves a combination of technical solutions, employee training, robust policies, and a contingency plan for emergencies. 

  • Deploy robust antivirus and anti-malware tools on all devices.

  • Network-based firewalls and IDS monitor and block suspicious activities. You can read more about Firewall protection here. 

  • Implement spam filters to block phishing emails and malicious attachments.

  • Regularly update all software and operating systems to close security vulnerabilities.

  • Maintain secure, regular backups of critical data. Encrypt backups and store them offline or in a separate network segment.

  • Enforce the principle of least privilege (PoLP) to limit user access to essential systems and data.

  • Educate employees on recognizing phishing emails, suspicious links, and malicious attachments.

  • Conduct regular cybersecurity awareness programs and simulated phishing tests.

  • Develop a clear incident response plan.

  • Enforce a strong password policy and implement multi-factor authentication (MFA).

  • Establish an acceptable use policy for company devices and networks.

In the video below, you will better understand how data backups and MFA are essential to your protection strategy against ransomware attacks. 

Ransomware is a growing threat, but a proactive, layered defence strategy can help protect your business. The important is that you’re not unprepared. 

Related Posts

Table of Contents

This post is about...

Author

Leave a comment

Your email address will not be published. Required fields are marked *