Anatomy of a Ransomware Attack

Ransomware isn’t a new phenomenon, but it’s effects are starting to be felt more widely, and more deeply than ever before. Behemoths like Sony, Nissan, FedEx, Kraft Foods and Deutsche Bank have all been hit in recent years, and the list is growing. The ongoing saga of the ransomware attack in Baltimore, MD has left citizens unable to pay parking tickets or finalize property sales.

American small businesses may bear the brunt of the impact of ransomware’s global spread. A survey by Datto suggests that ransomware attacks cost billions in lost productivity each year.

Shockingly, 77 percent of companies infected were running up-to-date endpoint protection, which tells us that the problem lies somewhere else. Human error, loose passwords, and lax authentication protocols all contribute to higher risk.

Let’s walk through a typical ransomware attack to understand how attackers gain access to your company’s most valuable asset: unstructured data.

Step 1: Identify a vulnerable network using sophisticated tools to detect and probe networks for lax security protocols, unpatched software, or single-factor-authentication.

Step 2: Scrape user password off the dark web. There are billions available.

Step 3: Use a third-party site to verify the stolen password. Check against data on a common social media site such as LinkedIn.

Step 4: Obfuscate their location by logging in via 50+ worldwide proxies.

Step 5: Step Pull down your proprietary data, encrypt it, and spread it across the blockchain in data centers across the globe.

Step 6: Demand thousands of dollars for the safe return of your data and cripple your day-to-day operations in the meantime.

This whole process can happen right under your nose. If you decide not to pay, your data may disappear forever. If you don’t take steps to address the underlying vulnerability, it can keep happening over and over.

There are some common-sense approaches to data governance that can help keep data from being hijacked. First, strong passwords are the first line of defense. Two-factor authentication and a good password manager should be the default posture of every organization.

Second, basic data hygiene and consistent permissions monitoring can limit which data is accessible to a bad actor who logs on with valid credentials.

Third, you must be able to monitor accounts for unusual behavior. When users are suddenly accessing massive amounts of data or downloading hundreds of files at a time, admins need to know.

Finally, ransomware detection should be part of the security posture. This includes scanning unstructured data for suspicious or altered file extensions, known ransomware signatures, and detection of “ransom note” content inside the repository.

The bottom line: if you think endpoint security will save you from ransomware, think again.

This article was originally published on Help Net Security and can be found here.

Get started with Egnyte today

Explore our unified solution for file sharing, collaboration and data governance.

Protecting Sensitive Data with Egnyte in Today’s Threat Environment
December 12, 2023
Dawid Balut
Read Article
5 Ways to Protect Your Company’s Valuable Life Sciences Data
October 27, 2023
Neil Jones
Read Article
Author
Kris Lahiri

View All Posts
Don’t miss an update

Subscribe today to our newsletter to get all the updates right in your inbox.

By submitting this form, you are acknowledging that you have read and understand Egnyte's Privacy Policy

Thank you for your subscription!

Welcome to
Egnyte Blog

Company News
Product Updates
Life at Egnyte
Industry Insights
Use Cases