Ransomware, like any other malware, breaks into networks using traditional types of infiltration:
- Emails and messages in instant messengers with suspicious links, social engineering methods (baiting, honey traps, scareware), phishing, and malicious sites.
- Software and remote desktop protocol vulnerabilities. With the transition to remote work and reliance on remote desktop software, the number of malicious emails jumped by 600% in the first few months of the pandemic alone.1 Similarly, as organizations move to hybrid set-ups or cloud storage systems, vulnerabilities associated with the cloud are being exposed.
Without the use of a network segmentation policy (more on this below), attackers are free to roam the network, infecting endpoints and servers, and demanding a ransom for regaining access to data.
Email attacks, which allow ransomware to enter a network, are difficult to stop. Attackers can trick even experienced users into clicking on an expected link (such as a financial report) or on a photo purporting to come from someone employees know. It may even be a document that appears to have been forwarded by the boss. These could be emails sent to millions of potential victims or targeted messages to a specific person in a specific organization. The latter is usually combined with social engineering methods, with the help of which cybercriminals collect the necessary information about the victim in advance. These attacks depend on the weakest link in the security chain: the fallible human element. Therefore, organizations must take all necessary training measures to minimize potential attacks.
After a successful attack, the attackers inform their victims that their data is encrypted. To access the decryption key, the victim must make an immediate payment, often in cryptocurrency, which obscures the attacker’s identity. You will know that you are a victim of ransomware if a pop-up window appears on your desktop or a readme.txt file that reads something like this: “Your files have been encrypted and are now inaccessible. You will lose all your information on X date if you do not pay X amount in bitcoins.” There may also be a postscript such as: “IMPORTANT! All your files are encrypted with RSA-2048 and AES-256 algorithms.”
Thankfully, since the cryptocurrency does not hide the wallet address, attackers can sometimes be detected. For example, in the United States, they were able to return part of the ransom after the ransomware attack on the Colonial Pipeline company in May last year, committed by the DarkSide hacker group.2 This is not the norm, however, and companies should not expect to get their ransom payment back.
If a company does not pay within the initial period (usually 48 to 72 hours), attackers are not shy about increasing the ransom and often threaten to delete or compromise data. Of course, in such cases, you can turn to cybersecurity specialists in the hope that they will find a way to recover data. Such options are possible but unlikely.
Modern ransomware also often contains data extraction tools, so sensitive information such as usernames and passwords can simply be stolen.
For all these reasons, the best practice is to proactively prevent ransomware from intruding into the network. And because the breaches in the network mostly happen through unsuspecting users, one of the main tasks in preventing these attacks is training personnel.
Equally important is email and network security, and the network must include a reliable backup program. Fresh copies of the data, which can always be returned in the event of a destructive cyberattack, must be created at least daily.