Warning: Undefined array key "login_id" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 36

Warning: Undefined array key "md5_hash" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 37

Warning: Undefined array key "tran_mode" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 40

Warning: Undefined array key "debug" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 41

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723
{"id":23882,"date":"2020-09-29T15:35:34","date_gmt":"2020-09-29T13:35:34","guid":{"rendered":"https:\/\/asdafrica.com\/?p=23882"},"modified":"2020-09-29T15:35:34","modified_gmt":"2020-09-29T13:35:34","slug":"preparing-for-a-ransomware-attack-prevention-detection","status":"publish","type":"post","link":"https:\/\/asdafrica.com\/preparing-for-a-ransomware-attack-prevention-detection\/","title":{"rendered":"Preparing for a Ransomware Attack: Prevention & Detection"},"content":{"rendered":"
Published on September 03, 2020 | By Infrascale<\/h5>\n

Preparing for a Ransomware Attack: Prevention & Detection<\/strong><\/h3>\n

What is Ransomware?<\/strong><\/h3>\n

Ransomware is a type of malware that encrypts a victim\u2019s data, blocking access until a ransom is paid.\u00a0 There are multiple varieties of ransomware, however, they all share the same extortion-oriented goal: a demand for payment using digital currency, like bitcoin. Digital currencies are preferred as they are hard to track, making it difficult to find and prosecute the perpetrators.\u00a0 A common feature of recent ransomware attacks is the inclusion of a countdown timer. These timers badger the victim to pay before time runs out, else the ransomware will permanently delete the data. One example of ransomware that utilizes such a timer is called Jigsaw ransomware. Once Jigsaw infects a computer, it demands payment and starts deleting files (in groups) over the next 72 hours, until they are all gone. For added incentive (or terror), Jigsaw ransomware will delete a 1,000 files if attempts are made to disrupt the deletion process, including trying to reboot the computer.<\/p>\n

Typical Vectors of Ransomware Infection<\/strong><\/h3>\n

Reported ransomware attacks grew over\u00a0365% in 2019<\/a>.\u00a0 A typical attack is carried out by tricking an end-user into clicking on a legitimate-looking file from a website or an e-mail attachment. Generally, for a virus or other security threat to work, they need root (or similar administrative) access to the computer. However, ransomware does not require this authority as it is only encrypting the user\u2019s data (i.e., the user opening the attachment).\u00a0 Since ransomware does not require elevated access, and security software often sees the user activity as a normal, it is almost impossible to stop every infection. The best plan is to prevent as much as you can\u00a0and<\/u><\/em>\u00a0have a plan for recovery.<\/p>\n

Prevention First \u2013 Patch, Update, and Educate<\/strong><\/h3>\n

The first tip to prevent ransomware attacks is to\u00a0keep your operating system and application software updated and patched<\/u>. This might sound obvious, but endpoints (like a laptop or desktop computer) are not as sophisticated as servers when running. Further, an end-user computer will typically execute\/run a multitude of applications from different vendors. To overcome the patching dilemma, Microsoft has created built-in tools to help administrators and end-users manage patches.\u00a0 There are also third-party management tools (typically used by IT departments) to enforce policy around software application versioning.\u00a0 Those third-party tools may also block undesirable software, like ransomware, through application whitelisting, which only allows approved applications to run. IT policy management tooling is a godsend in protecting end-user\u2019s computers, but requires a fair bit of management overhead.\u00a0\u00a0 For example, when a new patch comes out, the application must be whitelisted separately each time \u2013 a burden to manage hundreds of applications and patches to make sure your users can perform their jobs.<\/p>\n

All said, neither end-users self-updating applications nor updates driven thru IT policy management tools are enough.\u00a0\u00a0Application updates must be partnered with a good, up-to-date antivirus (AV) software.<\/u><\/p>\n

Last, but not least, is the importance of education.\u00a0End-user training is required to help them determine which emails not to open, and how to identify malicious senders and suspicious attachments<\/u>. Training all end-users in an organization reduces the risk of downloading malware.<\/p>\n

Endpoint Detection and Response (EDR)<\/strong><\/h3>\n

Bad actors are getting better at hiding their attacks, making it harder to detect them. They are also finding ways around antivirus detection software. This causes AV software to be silent, even when under attack. This is where Endpoint Detection and Response (EDR) can help. The goal of EDR is to look for bad behavior and alert the end-user (or administrator). Earlier warning of infection increases response time to stop the spread of the infection \u2013 and better yet \u2013 illuminate the exact timestamp of infection so that the exact recovery point is known.<\/p>\n

Endpoint Detection and Response operates via two key principles:<\/p>\n