Ransomware make you WannaCry? Fight back instead with the right tools and techniques
Hackers always attack low hanging fruit, the known vulnerabilities in the software that fuels your organization. The recent WannaCry ransomware attacks are no exception. They fully exploit a known vulnerability in Windows to execute on affected computers without administrative privileges and also to move laterally in the network infecting other machines.
Normally, ransomware attacks originate through a simple phishing or spear-phishing attack when the malicious software gains a foothold on a user machine. If the user has administrative privileges, the malware could easily infect all other computers. So how do you prevent ransomware attacks like WannaCry from becoming an enterprise-wide pandemic? As you’ll find below, the right techniques and tools can stop ransomware in its tracks. (And further below, you’ll find a brief recap on WannaCry.)The right techniquesEvery organization has its own, unique set of circumstances to consider when it comes to securing its IT and data. That said, there are security best practices that are universally appropriate, including:
- Concentrate on basic security measures: Many organizations deploy expensive security solutions, but fail to concentrate on basic security measures like keeping software versions updated, maintaining internal access controls, and turning on/off certain security settings. By following a sound vulnerability scanning and patch management process, you can significantly reduce the attack surface.
- Educate users: Social engineering often proves to be highly fruitful for hackers to perpetrate attacks. Even tech-savvy users are falling prey to such attacks. Fight back by educating your users to refrain from clicking links or opening attachments in malicious emails and exercise caution when downloading media files.
- Enforce least privilege: Ransomware and other malware usually require elevated privileges to execute and propagate inside the network. Eliminate that vulnerability by granting least privileges or just-in-time privileges to users who don’t need elevated privileges.
- Set application controls on endpoints: Executing malicious applications, software programs, or scripts results in the insertion and propagation of malware. Restrict the execution of unfamiliar or untrusted applications on endpoints to prevent ransomware attacks.
- Protect privileged accounts, control and monitor privileged access: Hackers target administrative passwords after gaining hold of a machine for lateral movement across the network. Protect privileged accounts with vaulting solutions and enforce best practices like strong, unique passwords with periodic rotation to stop ransomware in its tracks.
Comments