Skip to content

Strategy for fortifying against encrypting malware in the IT domain?

Cyber attacks primarily originate from ransomware, with a significant increase observed in recent years. The financial toll per attack is skyrocketing. Combat against ransomware remains challenging. Delve deeper, and you'll find a common thread among ransomware attacks, and that's where...

Strategic plan for safeguarding against malicious ransomware attacks in IT systems
Strategic plan for safeguarding against malicious ransomware attacks in IT systems

Strategy for fortifying against encrypting malware in the IT domain?

Ransomware, a malicious software that encrypts data from companies and organizations, demanding a ransom for decryption, poses a significant threat to IT systems worldwide. These attacks can enter through common channels such as phishing, spoofing, unpatched security vulnerabilities, and drive-by-downloads.

Before encrypting data, ransomware often copies business-critical data to the attacker's server via a DNS tunnel, a process known as data exfiltration. This makes the tactics and technologies of ransomware constantly evolving, with the DNS layer requiring high attention to detect ongoing attacks.

Most ransomware frameworks heavily rely on DNS tunneling for Command and Control, data exfiltration, and tunneling IP traffic. Notable examples include DNS-Beacon, SUNBURST, and OilRig. DNS activities can be detected and blocked early by using a DNS filter like Blue Shield Umbrella.

Blue Shield Umbrella, offered by Blue Shield Security GmbH, provides a Whitelist DNS filter and AI support. Combining a Whitelist DNS filter with an integrated sandbox can provide the highest possible protection against ransomware attacks. Sandboxes can be useful in protecting against ransomware, as they can respond to changed malware strategies and remain effective against increasingly intelligent malware.

Technical measures such as antivirus software, log management, firewalls, patch management, endpoint detection & response, and network detection & response can also help protect against ransomware. A Security Operations Center (SOC) or Information Security Management System (ISMS) is needed to collect and correlate information from different sources for effective protection.

Organizational measures are equally important. Security training and guidelines for employees can help instil a healthy dose of skepticism, which can be beneficial in combating zero-day malware. However, it's important to note that even the best technical measures and common sense can quickly become ineffective against new attack techniques.

In 2021, ransomware accounted for 12% of all malware attacks, quadrupling from the two years prior. Germany was one of the three most frequently targeted countries by malware at the end of 2021. Ransomware extortionists are primarily interested in collecting ransom, not your data. Better-protected IT systems can deter attackers.

After a possible incubation period, ransomware begins to encrypt data and databases, often deleting or deactivating protective measures like backups. It's crucial to have robust backup systems in place to minimise the impact of an attack. Ransomware attacks often lie dormant in networks for several days, making detection complex with purely technical measures.

Advanced threat protection products like Cisco Secure Endpoint combined with Cisco Secure Email Threat Defense offer integrated sandboxing and DNS filtering capabilities to block malicious domains and analyse suspicious files before execution. This combination can provide maximum security against ransomware attacks.

In conclusion, a comprehensive approach involving both technical and organisational measures is necessary to effectively protect against ransomware attacks. While no system can be completely immune, a combination of technical security measures, a DNS filtering solution integrated with a sandbox, and a bit of common sense can significantly reduce the risk of a successful attack.

Read also:

Latest