What You Need to Know to Shield Your Business from Ransomware
- by Brittany Day
The prevalence and impact of ransomware has become clearly apparent. Earlier this month, the closure of one of the US' largest pipelines due to ransomware highlighted the real-world consequences of a successful cyberattack. Ransomware attacks dominate security news headlines daily, so much so that people have begun to dismiss them as inevitable. But this is far from the truth. While ransomware is a serious threat to all businesses, the good new is that these devastating attacks can be prevented with a proactive, multi-layered email security solution in place. This article will explain everything you need to know about ransomware and ransomware protection to safeguard your users, your key assets and your reputation.
What is Ransomware and how does it work?
Ransomware is a type of malware designed to block access to a computer system until a sum of money in the form of untraceable Bitcoin is paid. It does this by encrypting a victim’s files until they have made the payment demanded by the attacker.
Ransomware can be delivered via multiple vectors, the majority of which utilize email. Phishing is one of the most common methods of delivery. When a user downloads a malicious attachment within a phishing email which contains ransomware, all of the user’s files are encrypted and made inaccessible until the ransom specified in a message presented to the user is paid.
In some cases, the attacker may claim to be a law enforcement agency shutting down the victim’s computer due to alleged pornography or illegal software found on it. In these cases, they often refer to the payment they are demanding as a “fine”, hoping that disguising it as such will make the victim less likely to report the attack. This highly deceptive tactic is often successful.
In the case of a specific variation of ransomware referred to as “leakware” or “doxware”, a criminal threatens to publicize sensitive information on the victim’s hard drive unless ransom is paid. However, obtaining such information is difficult and usually requires a significant amount of time and effort. As a result, encryption ransomware accounts for the majority of campaigns.
Who does ransomware target?
While ransomware is a serious threat to all businesses and organizations, some entities are at heightened risk of suffering an attack. For instance, medical facilities or government agencies are often targeted in ransomware campaigns because they tend to pay ransom quickly due to the fact that they need immediate access to their files. Over the past year, approximately 2,400 ransomware attacks have hit corporate, local and federal offices.
Small- to medium-sized businesses (SMBS) are also highly attractive targets among ransomware operators because attackers know that these companies often have smaller security teams and tend to invest less in cyber defense. Eighty-five percent of MSPs report ransomware as a common threat to SMBs, and 29% of small businesses have experience with ransomware - making them more likely to be unprepared for this threat. Data reveals that the majority of small businesses are not able to recover from an attack, and 60% of small companies go out of business within six months of getting hit with ransomware.
Common Types of Ransomware
Ransomware is constantly evolving, and sophisticated new strains are always emerging. While each new variant has unique characteristics and its own method of spreading, all strains of ransomware rely on similar social engineering tactics to deceive users and encrypt their files. Some notorious ransomware variants include:
- WannaCry: The most well-known ransomware variant around the globe, this cryptoworm has infected nearly 125,000 organizations in over 150 different countries.
- CryptoLocker: The CryptoLocker botnet has been around for the past two decades; however, the CryptoLocker ransomware emerged in 2013 when hackers used the original CryptoLocker botnet approach in ransomware. Between September and December 2013, CryptoLocker infected more than 250,000 systems and earned over $3 million for its creators before the botnet was taken down in 2014 in an international operation.
- Petya: This ransomware variant, which arrives in an email disguised as a job applicant’s resume, began spreading in March of 2016. If a user clicks on a malicious file within this email, his or her computer is rebooted and the user’s files become unreachable until ransom is paid. Petya encrypts .exe files, which interferes with victims’ ability to pay ransom in some cases.
- NotPetya: Similar to Petya, NotPetya encrypts a victim’s master file table and requests a Bitcoin ransom to restore access to these files. However, NotPetya is different, and more dangerous, than Petya in multiple ways. NotPetya spreads on its own, encrypts everything on a victim’s computer and technically is not ransomware. In the process of encrypting a user’s data, NotPetya damages it beyond repair. In 2017, a devastating NotPetya outbreak cost FedEx $300 million in lost business and cleanup costs.
- Bad Rabbit: This strain of ransomware typically spreads through a fake Adobe Flash update on compromised websites. It has infected organizations across Russia and Eastern Europe.
- Cerber: This ransomware variant targets cloud-based Microsoft Office 365 users. Millions of users have been victimized by a sophisticated phishing campaign carried out by Cerber ransomware. Secondary protection is critical in keeping Office 365 users and their data safe.
- Locky: A ransomware variant designed to lock victims’ computers until ransom is paid, Locky spreads through a seemingly harmless email disguised as an invoice.
The Future of Ransomware: Mobile Ransomware and RaaS
What does the future have in store for ransomware? The potential for authors and operators of ransomware to profit off their criminal activity is driving rapid innovation, resulting in the use of increasingly creative and sophisticated tactics. In this era, cybercriminals can easily replicate smaller attacks and use them against large corporations, demanding larger ransom payments. It only takes a small percentage of successful large-scale attacks to produce substantial revenue, and this serves as a major incentive for threat actors.
A report from the National Cyber Security Centre (NCSC) and the National Crime Agency (NCA) warns of developing ransomware threats like ransomware-as-a-service (RaaS) and mobile ransomware. Ransomware-as-a-service schemes on the dark web, which allow individuals and groups to have an impact disproportionate to their technical skill, are expected to become increasingly prevalent and problematic in the coming years. Because mobile phones often lack adequate security defenses and contain valuable information, mobile ransomware is on the rise. Security experts predict a steady increase in both the number of mobile ransomware attacks and the magnitude of these campaigns.
Best Practices for Protecting against Ransomware
While it is not always possible to prevent a successful cyberattack, engaging in security best practices and investing in a proactive, fully-managed email security solution can drastically reduce your risk. Some best practices for preventing a ransomware attack include:
- Think before you click! Make sure you have confirmed the legitimacy of an email before downloading any attachments it contains.
- Make sure your OS is patched and updated, reducing the chance of vulnerabilities existing that criminals could exploit.
- Back up your files frequently and automatically. This won’t prevent a ransomware attack, but it can reduce the damage caused by one. Be aware that backups are not foolproof: ransomware may sit idle for weeks until it is triggered, potentially destroying backups.
- Invest in a comprehensive, proactive cloud email security that accurately detects malicious emails (such as those containing ransomware) and prevents them from reaching the inbox.
How to Protect Backups from Ransomware
While backing up your files on a regular basis may reduce the devastation caused by a potential ransomware attack, backups are becoming less reliable as ransomware evolves. Threat actors are getting smarter, attacking backups to prevent recovery.
That being said, there are various best practices that users should engage in to protect their backups from ransomware. They include:
- Supplement backups with additional copies and third-party tools.
- Keep multiple copies of important files at multiple locations.
- Isolate backups - The more barriers that exist between an infected system and its backups, the harder it will be for ransomware to attack these backups.
- Test your backups! Perform restoration exercises on a regular basis to identify any issues that may exist with your backups.
What to do if your computer has been infected with Ransomware:
If you do fall victim to a ransomware attack, you will need to regain control of your computer. However, doing so will not decrypt your files. With the majority of ransomware variants, it is impossible for anyone to decrypt blocked files without access to the key held by the attacker. And be careful! By removing the ransomware from your computer, you eliminate the possibility of recovering encrypted files by paying the ransom.
Should I pay the ransom?
Theoretically, paying the ransom that criminals demand simply perpetuates the cycle of cybercrime. Decryption keys for many common strains of ransomware are available, and victims should always seek the guidance of security experts before even considering paying the ransom that attackers demand. In many cases, it is possible to recover encrypted data without paying criminals to do so.
Sites like No More Ransomware were established to evaluate your encrypted files after you’ve been compromised to help you ascertain the type of ransomware used. They also have an index of a large list of ransomware decryption tools with pointers on where to find and download the tools necessary to decrypt them. Many of the popular antivirus vendors have similar pages, and Guardian Digital can also assist you with this process as part of the services we provide to our clients.
However, in cases involving newer or less common ransomware variants, decryption tools may not be available, and not paying the ransom that attackers ask for is often unrealistic for businesses and organizations that have lost important data. Although sixty-six percent of companies say that they would never pay ransom to cyber criminals, in reality sixty-five percent do pay ransom when they get hit with an attack. Realistically, the decision of whether or not to pay ransom to restore encrypted files is complex: it is both a moral and a practical decision which often involves doing a cost-benefit analysis.
The FBI’s position on how to deal with a ransomware attack has been somewhat unclear until recently. In 2015 an FBI agent told the audience at a computer security conference in Boston, “We often advise people just to pay the ransom.” The FBI later corrected its position, announcing that ransomware victims should never pay ransom to attackers, adding that paying ransom does not guarantee that encrypted files will be recovered and that payments may be used to fund other criminal activity.
The Bottom Line
When it comes to ransomware, prevention is far better than remediation and implementing the caliber of email protection required to repel these increasingly sophisticated attacks is an investment that continues to pay off - both in terms of business security and success.
Want to learn more about the magnitude of your business email risk and get expert advice on how you can reduce it? Use our free Email Risk Assessment Toolkit and learn about steps you can take to better secure your business against phishing, ransomware and other sophisticated modern threats in less than two minutes. Assess My Email Risk Now>
- Thinking Strategically about Email Security in 2021 and Beyond
- Behind the Shield: EnGarde Cloud Email Security Explained
- Open Source: A Powerful, Yet Underutilized Weapon against Phishing & Zero-Day Attacks
- Buyer's Guide: What to Prioritize in an Email Security Solution
- Buyer's Guide to Office 365 & Workspace Email Security
- EnGarde Cloud Email Security: The Logical Solution to Cyber Risk in Office 365
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Top Email Security Risks in 2021 - How To Set Your Business Up for Safety & Success
- Ransomware By The Numbers: How Big Is My Risk?
- SMB Ransomware Warnings & How To Prevent an Attack
- Apache SpamAssassin 3.4.6 Release Fixes Two Potentially Aggravating Bugs
- Top Tips and Advice for Staying Safe Online in a Work-from-Home World
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Why Your Business Needs Better Email Security
- Why Ransomware is a Threat to Business
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Why Office 365 Users Are Moving Away from Relying on Default Email Protection Alone
- What You Need to Know to Shield Your Business from Ransomware
- Why You Need DMARC to Secure Email against Spoofing Attacks & Sender Fraud
- Biden's Cybersecurity Efforts Highlight the Power of this Key Technology
- Shortcomings of Endpoint Security in Securing Business Email
- Open Source Utilization in Email Security Demystified
- Limitations of Microsoft 365 Email Security & How To Close These Dangerous Gaps
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2021
- Complete Guide to Email Viruses & Best Practices to Avoid Infections
- Security Expert Dave Wreski Discusses Guardian Digital’s Use of Open Source for Email Security
- Are Employees the Weakest Link in Your Email Security Strategy?
- Top Email Security Trends Putting Your Business at Risk of Attack in 2021
- There’s a Lot to be Gained with Effective Email Security
- You’ve Got Mail: How To Tell If It’s Fraud
- How To Keep Email Private with TLS
- DMARC Quarantine vs. Reject: Which Should You Implement to Secure Business Email against Sender Fraud?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: A Passionate Engineer Brings the Power of Open Source to Business Email Security
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- The Remote Worker's Guide to Safely Navigating Office 365
- Why Your Business Needs Superior Email Protection
- Defending Against COVID Email Spoofing Attacks with DMARC
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How to maintain security when employees work remotely: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Keep the Holidays Merry & Bright - Beware of These Sneaky Seasonal Phishing Scams
- Migrating Business Email: The Hidden Complexities You Need To Know
- SPF, DKIM & DMARC: Definition & How They Secure Email Against Sender Fraud?
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Complete Guide on Email Security & Threats Faced by Organizations
- What Are Zero-Day Attacks & How Can I Prevent Them?
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail