Digital transformation is now a number one strategic business goal. From Sydney to San Francisco, boardrooms are working out how best to harness the power of the cloud, AI, IoT and more to drive success. Their efforts are not only vital to create new customer experiences and streamline business processes. They are also critical to supporting the new hybrid working model rapidly emerging from the ashes of the pandemic.
However, the price organizations often pay for growing their digital footprint is expanding the cyberattack surface. This invites cyber risk — particularly the threat of damaging ransomware breaches.
Scores of ransomware developers and affiliate groups are currently operating around the globe. That means there are also a wide variety of attack tactics, techniques and procedures in circulation. But that doesn’t mean we can’t discern a primary modus operandi. Even better, we can take this general attack pattern and apply a simple three-step process to help mitigate ransomware risk.
This is the value of micro-segmentation based on comprehensive visibility into the communications of network assets and the common pathways used by threat actors.
Ransomware reached record-breaking levels within the first three quarters of 2021, with one vendor recording close to 500 million compromise attempts globally. Attacks have evolved in recent years to the point where data exfiltration is now the norm, adding a whole new element of business risk. It means organizations can’t simply back-up data and cross their fingers. There’s a real risk of financial and reputational damage stemming from the data breach alone.
Today, so-called “double extortion” attacks could result in:
Every organization and every attack is different. While some commentators estimate the average financial impact at nearly $2 million today, some raids have cost victims hundreds of millions. That makes it essential to take proactive steps to counter the threat.
The good news is that, despite the many variants and affiliate groups in operation today, we can discern a basic pattern to most attacks. In short, threat actors:
The goal for attackers is to stay hidden until they have built a strong enough presence inside a victim’s network to steal large volumes of sensitive data and deploy ransomware everywhere.
To do so, they:
Most ransomware arrives via phishing emails, RDP compromise or exploitation of software vulnerabilities. To increase the chances of success, attackers look for:
Most attacks begin with compromising a low-value asset, as these are usually easier to hijack. The trick for threat actors is then to move through additional stages to reach valuable assets that they can steal data from or encrypt, providing leverage when extorting the victim organization.
To do so, attackers usually:
With this typical attack pattern in mind, CISOs can begin to devise a response — a new security architecture based around three simple components:
1.Develop comprehensive visibility of communication flows across your environment
This will leave your attackers with nowhere to hide, unmasking them as they try to compromise the initial asset or during lateral movement.
To do so, you must:
2. Build ransomware-blocking capabilities
It’s not good enough to merely map communication flows and understand which assets can be closed. You need to take action to reduce the attack surface and block in-progress raids.
Do this by:
3. Isolate critical assets
The final stage is to prevent attackers from reaching critical assets, forcing them to take easier-to-detect actions to progress.
This will involve:
No organization can be 100% breach-proof today — attackers are too determined, well resourced and great in numbers for that. But with the right focus on network visibility, policy controls and segmentation, you can build a smarter security architecture more likely to isolate the threat.
Most threat actors are opportunistic, looking for a quick and easy ROI. Take these three steps to disrupt their plans, and you stand a great chance of avoiding serious compromise.
Source: illumio.com
All Rights Reserved | John&Partners LLC.