Interior minister graces graduation ceremony at Naif Arab University for Security Sciences    Prophet's Mosque imam underscores Islam's core values at peace conference in India    Saudi, Indian foreign ministers co-chair Cooperation Committee meeting in New Delhi    198 new sites documented in the National Antiquities Register    Cityscape Global 2024: Saudi real estate sector booms with SR180 billion in new projects    PIF to sell 2% stake in stc via accelerated book-building    SAMA issues rules for opening electronic wallets    TGA suspends 2 passenger transport applications and an application for food delivery    South Korean actor Song Jae Lim found dead at 39    Trump names Fox News host Pete Hegseth as defense secretary pick    There is nowhere safe in Gaza, UNRWA director says    Archbishop of Canterbury resigns over Church abuse scandal    US says it will not limit arms transfers to Israel    Don't sit on the toilet for more than 10 minutes, doctors warn    Saudi Champion Saeed Al-Mouri scores notable feat in Radical World Championship in Abu Dhabi with support from Bin-Shihon Group    'Marvels of Saudi Orchestra' to dazzle audience in Tokyo on Nov. 22    Rita Ora is tearful in tribute to Liam Payne at MTV Awards    France to deploy 4,000 police officers for UEFA Nations League match against Israel    Al Nassr edges past Al Riyadh with Mane's goal to move up to third    Al Ahli continues strong form with 2-0 win over Al Raed in Saudi Pro League    India puts blockbuster Pakistani film on hold    The Vikings and the Islamic world    Filipino pilgrim's incredible evolution from an enemy of Islam to its staunch advocate    Muted Eid celebrations for millions of Nigerian Muslims    Exotic Taif Roses Simulation Performed at Taif Rose Festival    Asian shares mixed Tuesday    Weather Forecast for Tuesday    Saudi Tourism Authority Participates in Arabian Travel Market Exhibition in Dubai    Minister of Industry Announces 50 Investment Opportunities Worth over SAR 96 Billion in Machinery, Equipment Sector    HRH Crown Prince Offers Condolences to Crown Prince of Kuwait on Death of Sheikh Fawaz Salman Abdullah Al-Ali Al-Malek Al-Sabah    HRH Crown Prince Congratulates Santiago Peña on Winning Presidential Election in Paraguay    SDAIA Launches 1st Phase of 'Elevate Program' to Train 1,000 Women on Data, AI    41 Saudi Citizens and 171 Others from Brotherly and Friendly Countries Arrive in Saudi Arabia from Sudan    Saudi Arabia Hosts 1st Meeting of Arab Authorities Controlling Medicines    General Directorate of Narcotics Control Foils Attempt to Smuggle over 5 Million Amphetamine Pills    NAVI Javelins Crowned as Champions of Women's Counter-Strike: Global Offensive (CS:GO) Competitions    Saudi Karate Team Wins Four Medals in World Youth League Championship    Third Edition of FIFA Forward Program Kicks off in Riyadh    Evacuated from Sudan, 187 Nationals from Several Countries Arrive in Jeddah    SPA Documents Thajjud Prayer at Prophet's Mosque in Madinah    SFDA Recommends to Test Blood Sugar at Home Two or Three Hours after Meals    SFDA Offers Various Recommendations for Safe Food Frying    SFDA Provides Five Tips for Using Home Blood Pressure Monitor    SFDA: Instant Soup Contains Large Amounts of Salt    Mawani: New shipping service to connect Jubail Commercial Port to 11 global ports    Custodian of the Two Holy Mosques Delivers Speech to Pilgrims, Citizens, Residents and Muslims around the World    Sheikh Al-Issa in Arafah's Sermon: Allaah Blessed You by Making It Easy for You to Carry out This Obligation. Thus, Ensure Following the Guidance of Your Prophet    Custodian of the Two Holy Mosques addresses citizens and all Muslims on the occasion of the Holy month of Ramadan    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Ensure your data is not taken hostage
Published in The Saudi Gazette on 20 - 08 - 2016

AFTER slowing slightly in mid-2015, ransomware has overall regained its rapid growth rate. According to the June 2016 McAfee Labs Threats Report, total ransomware grew 116% year-over-year for the period ending March 31.
Total ransomware rose 26% from Q4 2015 to Q1 2016 as lucrative returns continued to draw relatively low-skilled criminals. An October 2015 Cyber Threat Alliance analysis of the CryptoWall V3 ransomware hinted at the financial scale of such campaigns. The researchers linked just one
campaign's operations to $325 million in victims' ransom payments.
This spurt in Ransomware attacks can be attributed to three key reasons. The first driver is the syndication of the activity into ransom as a service with offers of revenue sharing to operatives facing the target recipients. The second driver is the development of polymorphism in ransomware generating a unique threat signature for each attack. And the third driver is the increasing sophistication within the malware, widening the scope of damages.
As organizations in KSA become a target for Ransomware attacks, it is incumbent on the C-suite to take action and ensure that their data and organizations are not held ransom.
Remediation Strategies for Each Stage
Ransomware attacks occur in five stages — distribution, infection, communication, encryption and demand. So it is only logical that there should be prevention and remediation strategies for each of these stages.
Distribution Stage
Build a "human firewall": The biggest threat is users who let the ransomware on their endpoints. People are the weakest link. Organizations need to make sure that all employees from the CEO down, understand both how ransomware works as well as the ramifications of an attack.
Stop ransomware before the endpoint: The most-proactive method of protecting a network from ransomware attack (other than the human firewall) is to keep ransomware from reaching the endpoint in the first place. Consider a web-filtering technology.
Apply all current operating system and application patches: Many ransomware strategies take advantage of vulnerabilities in the operating system or in applications to infect an endpoint. Having the latest operating system and application versions and patches will reduce the attack surface to a minimum.
Spam filtering and web gateway filtering: Again, the ideal approach is to keep ransomware off the network and the endpoint. Spam filtering and web gateway filtering are great ways to stop ransomware that tries to reach the endpoint through malicious IPs, URLs, and email spam.
Allow only whitelisted items to execute: Use an "application control" method that offers centrally administered whitelisting to block unauthorized executables on servers, corporate desktops, and fixed-function devices, thus dramatically reducing the attack surface for most ransomware.
Limit privileges for unknown processes: This can be done easily by writing rules for host intrusion prevention systems or access protection rules.
Infection Stage
Don't turn on macros unless you know what's happening: In general, do not enable macros in documents received via email. Notice that Microsoft Office turns off auto-execution of macros for Office documents by default. Office macros are a popular way for ransomware to infect your machine, so if a document "asks" you to enable macros, don't do it.
Make yourself "weaker" when working: Don't give yourself more login power than you need. If you allow yourself administrator rights during normal usage, consider restricting this. Surfing the web, opening applications and documents, and generally doing a lot of work while logged in with administrative rights is very dangerous. If you get hit with malware while you have fewer rights, you will reduce your risk because malware will also execute with fewer rights, which will reduce the threat's attack surface.
Use access protection rules on software installs: Write access control rules against targeted file extensions that deny writes by unapproved applications. This complements host intrusion prevention systems rules with a similar strategy.
Use sandboxing for suspicious processes: If a process is flagged as suspicious (due to low age and prevalence, for example), that process should be sent to a security sandboxing appliance for further study.
Block "unapproved" processes from changing files: Block these by writing rules for host intrusion prevention systems or access protection.
Communication Stage
Firewall rules can block known malicious domains: Writing rules to block malicious domains is a standard capability of network firewalls.
Proxy/gateway scanner signatures for known traffic: For those with proxy and gateway appliances, these technologies can be configured to scan for known ransomware control server traffic and block it. Most ransomware cannot continue operations if it cannot retrieve the public encryption key needed for asymmetric encryption.
Encryption Stage
Back-up and restore files locally: By creating a storage volume and running archival differential-based file backups to that storage volume, remediation is as easy as removing the ransomware, going back in time with the backup to a point before the ransomware affected the files, and restoring all the affected files. This can be done today by network administrators who could either use external storage volumes with a good archival backup utility or partition a local drive and run the backup utility against that.
Limit shared file activities: Many ransomware variants will look for access to files on storage other than the boot volume — such as file servers, additional volumes, etc. — and will encrypt everything they can find to inflict maximum damage. Consider limiting operations allowed on shared volumes.
Ransom Demand Stage
Restore from backup, keep a recent backup offsite and "air gapped": Store a set of multiple, complete backups and assume an attack. An "air-gapped" backup is not connected to the computer or the network anywhere. (For an individual this could mean back up to an external hard drive. When the backup is done, unplug the drive and keep it in a drawer, away from any computers. That way ransomware cannot detect the backup and damage it.) Consider using a "bare metal backup" utility, which not only backs up your user files, but also lets you erase all storage volumes (in case the machine is stolen) and get you back to a usable state with all your applications and data restored.
Ensuring your organization's precious data is not ripe for the taking is a daunting task, especially with the steady rise of ransomware as an attack vector. By adopting a planned approach involving both end users and IT administrators, and implementing integrated security solutions that protect, detect and correct, businesses in KSA can avoid the unplanned downtimes and losses associated with such malware attacks.
— The writer is VP & CTO, EMEA, Intel Security


Clic here to read the story from its source.