Virtualization Technology News and Information
Article
RSS
Mitigating the risk of ransomware attacks in hard-hit industries

By Steven Freidkin

One unexpected but substantial impact of the whole COVID-19 experience has been an increase in cyberattacks. If that doesn't make immediate sense, consider the fact that the pandemic forced many companies to shift the bulk of their operations online.

While all that increased connectivity allowed companies to mitigate business interruptions, the process has unfortunately created vulnerabilities for unscrupulous individuals and cybercrime organizations to exploit. The very technologies that enabled companies to make the offline-to-online transition, including email and remote network access, have also created increased opportunities for phishing and ransomware.

A particularly insidious consequence has been the rise of Ransomware as a Service (RaaS) offerings, online software platforms that provide kits and subscription services to allow almost anyone at home to launch their own ransomware attacks. All it takes is a quick search on the dark web and a nominal fee. The services even provide troubleshooting tips and Q&A forums.

With the new found ease of execution, there are specific industries that must remain extra vigilant in these insecure times.

Industries most at risk

Though RaaS attacks have been on the rise in general, a new report from Trellix found that the majority of ransomware attacks target three industries: banking and finance (22%), utilities (20%), and retail (16%). Clearly organizations in these sectors need to be extra vigilant as these attacks continue to proliferate.

Utilities are an especially vulnerable sector, since they provide particularly vital services such as electricity, water, and internet access. Due to the essential nature of these services, utility companies that find themselves under attack might feel particularly intense pressure to acquiesce and pay the ransom.

Because these RaaS platforms are so easy to use, it's becoming increasingly important for organizations to strengthen their cybersecurity protocols and institute good cyber-hygiene to avoid vulnerability. As always, prevention is the best line of defense.

How do the attacks work?

Companies that provide ransomware often specialize in a particular type of attack, such as malware or network penetration. They can either develop the software for their own use or package it and sell the technology to amateurs.

Phishing scams are the most common and simplest form of ransomware attacks. Phishing involves stealing data by tricking end users into clicking on phony hyperlinks, opening infected email attachments, or entering login information on a bogus website. One especially insidious type of phishing attack involves subjecting users to phony security warnings, which can appear very convincing and elicit hasty reactions from employees who aren't technical savants.

Attacks that exploit security gaps in Remote Desktop Protocols, or RDPs, are also growing in popularity. RDPs allow users to access company networks from a remote location. This allows all of a company's workers to gain access over the same network, which can easily be exploited by outsiders to gain access. And once a system has been penetrated, the RaaS provider might even sell access to that system to other buyers in their network.

Creating a line of defense

Protecting your organization from ransomware attacks starts from the ground up. Your employees are your best and most reliable line of defense.

Risk mitigation begins with an employee education program. Train your personnel to prevent phishing attacks by avoiding clicking on any link or attachment that appears even slightly suspicious. High-risk organizations should also require employees to complete cybersecurity training modules and use test simulations to see how employees perform in real-world scenarios.

Furthermore, corporations should employ protective software to detect and resolve infections before they become system-wide. It might also be wise to subscribe to verified threat-hunting software, which routinely scans your system to search for signs of infection or penetration, and provides an early warning to stop any attack in its tracks.

The most important and effective thing you can do is perform regular and complete system backups and store those backups in multiple secure locations. That way, even if your system is breached, you will still have access to vital data. Cyberattackers will have less leverage over your organization if backups of your data are easily accessible.

To pay or not to pay?

Even if you've taken every precaution, you could still find your organization infiltrated and your systems taken hostage. Attackers could, for instance, encrypt all of your data and require a ransom before handing over a decryption key. The problem is, that decryption key might not exist. The ransomer may not even have bothered to create such a key, as they are too busy launching additional attacks.

The FBI advises against paying ransomware attackers, since paying the ransom will only make you a mark for future attacks, and there's no guarantee you'll even regain access to your data anyway. Again, if your company engages in frequent system backups, you'll minimize any leverage that attackers might have, and you can restore operations with minimal losses. 

In the event of an attack, be sure to consult with a cybersecurity professional and local law enforcement to explore options for your next move. It would also be wise to enlist the help of a professional before an attack, to see if they can find any gaps in your system or holes in your lines of defense.

But ultimately, at-risk organizations must remain extra vigilant as the ease of launching RaaS attacks increases and advances in RaaS technology make a life of cybercrime accessible to more people.

##

ABOUT THE AUTHOR

steven-freidkin 

Steven Freidkin is the CEO and founder of Managed Security Services Provider (MSSP), Ntiva and has over 17 years of experience within the MSP industry.

Published Friday, March 25, 2022 7:33 AM by David Marshall
Filed under: ,
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<March 2022>
SuMoTuWeThFrSa
272812345
6789101112
13141516171819
20212223242526
272829303112
3456789