Ransomware for business

   read

What Is Ransomware?

According to the FTC, ransomware is a form of malicious software that infiltrates computer systems or networks and uses tools like encryption to deny access or hold data "hostage" until the victim pays a ransom, frequently demanding payment in Bitcoin.  According to the FBI, after the initial infection, the ransomware attempts to spread to shared storage drives and other accessible systems. If the demands are not met, the system or encrypted data remains unavailable, data may be deleted or leaked online as a form of extortion. 

How Is Ransomware Delivered?

According to the FTC, ransomware often arrives through email phishing campaigns, which typically require the user to take an action such as clicking on a link or downloading a malicious attachment. Other campaigns use drive-by downloads, where a user visits a malicious website or a site that has been compromised, and the act of loading the site causes the ransomware to automatically download onto the user's computer. In addition, ransomware is delivered through "malvertising" campaigns, where malicious code is hidden in an online ad that infects the user's computer. These attacks can occur even on trusted websites through third-party ad networks that redirect the user to an infected server.

  • Scam emails with links and attachments that put your data and network at risk. These phishing emails make up most ransomware attacks.
  • Server vulnerabilities which can be exploited by hackers.
  • Infected websites that automatically download malicious software onto your computer.
  • Online ads that contain malicious code — even on websites you know and trust.

How Ransomware Works
How Ransomware Works
How Ransomware Works

What Are the FBI Recommendations for Responding to Ransomware?

The FBI recommends that organizations do the following.

  • Isolate the infected computer immediately, and remove infected systems from the network as soon as possible to prevent ransomware from attacking network or share drives.
  • Isolate or power off affected devices that have not yet been completely corrupted.
  • Immediately secure backup data or systems by taking them offline, and ensure backups are free of malware.
  • Contact law enforcement immediately.
  • Collect and secure partial portions of the ransomed data that might exist if available.
  • Change all online account passwords and network passwords after removing the system from the network if possible, and change all system passwords once the malware is removed from the system.
  • Delete registry values and files to stop the program from loading.
  • Implement security incident response and business continuity plans.
  • Conduct a post-incident review of the response to the incident, and assess the strengths and weaknesses of the incident response plan. (See the FBI's brochure, Ransomware Prevention and Response for CISOs.)

How Should You Report Ransomware to Law Enforcement?

The FBI is requesting that victims reach out to their local FBI office and/or file a complaint with the Internet Crime Complaint Center with the following ransomware infection details (as applicable).

  • Date of infection
  • Ransomware variant (identified on the ransom page or by the encrypted file extension)
  • Victim company information (industry type, business size, etc.)
  • How the infection occurred (link in email, browsing the Internet, etc.)
  • Requested ransom amount
  • Actor's Bitcoin wallet address (may be listed on the ransom page)
  • Ransom amount paid (if any)
  • Overall losses associated with a ransomware infection (including the ransom amount)
  • Victim impact statement (See the FBI public service announcement from September 15, 2016, "Ransomware Victims Urged To Report Infections to Federal Law Enforcement.")

Should Organizations Pay the Ransom?

The FBI does not support paying a ransom to the adversary because it does not guarantee the victim will regain access to their data. In fact, some individuals or organizations are never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to target other victims for profit and could provide an incentive for other criminals to engage in similar illicit activities for financial gain. Although the FBI does not support paying a ransom, it recognizes that executives, when faced with inoperability issues, will evaluate all options to protect their shareholders, employees, and customers.

There are serious risks to consider before paying the ransom. USG does not encourage paying a ransom to criminal actors. However, after systems have been compromised, whether to pay a ransom is a serious decision, requiring the evaluation of all options to protect shareholders, employees, and customers. Victims will want to evaluate the technical feasibility, timeliness, and cost of restarting systems from backup. Ransomware victims may also wish to consider the following factors:

  • Paying a ransom does not guarantee an organization will regain access to their data; in fact, some individuals or organizations were never provided with decryption keys after paying a ransom.
  • Some victims who paid the demand were targeted again by cyber actors.
  • After paying the originally demanded ransom, some victims were asked to pay more to get the promised decryption key.
  • Paying could inadvertently encourage this criminal business model. 

What Prevention and Continuity Measures Exist?

The FBI recommends organizations consider implementing the following prevention and continuity measures to lessen the risk of a successful ransomware attack.

  • Regularly back up data, and verify the integrity of the backups.
  • Secure backups, and ensure backups are not connected to the computers and networks they are backing up.
  • Scrutinize links contained in emails, and do not open attachments included in unsolicited emails.
  • Only download software, especially free software, from known and trusted sites, and verify the integrity of the software through a digital signature before execution when possible.
  • Ensure application patches for the operating system, software, and firmware are up to date, including Adobe Flash, Java, Web browsers, etc.
  • Ensure antivirus and antimalware solutions are set to automatically update and regular scans are conducted.
  • Disable macro scripts from files transmitted via email, and consider using Office viewer software to open Microsoft Office files transmitted via email instead of full Office Suite applications.
  • Implement software restrictions or other controls to prevent the execution of programs in common ransomware locations, such as temporary folders supporting popular Internet browsers or compression/decompression programs, including those located in the AppData/LocalAppData folder. (See the FBI's brochure, Ransomware Prevention and Response for CEOs.)

The FBI also recommends that organizations do the following.

  • Enable strong spam filters to prevent phishing emails from reaching the end users, and authenticate inbound email using technologies like Sender Policy Framework, Domain Message Authentication Reporting and Conformance, and DomainKeys Identified Mail to prevent email spoofing.
  • Scan all incoming and outgoing emails to detect threats, and filter executable files from reaching end users.
  • Configure firewalls to block access to known malicious IP addresses.
  • Consider disabling Remote Desktop Protocol if it is not being used.
  • Conduct an annual penetration test and vulnerability assessment. (See the FBI's brochure, Ransomware Prevention and Response for CISOs.)

Following are additional considerations for businesses.

  • Focus on awareness and training. Because end users are often targeted, employees should be made aware of the threat of ransomware, how it is delivered, and be trained on information security principles and techniques.
  • Patch all endpoint device operating systems, software, and firmware as vulnerabilities are discovered.
  • Manage the use of privileged accounts by implementing the principle of least privilege. No users should be assigned administrative access unless absolutely needed. Those with a need for administrator accounts should only use them when necessary, and they should operate with standard user accounts at all other times.
  • Configure access controls with least privilege in mind.
  • Use virtual environments to execute operating system environments or specific programs.
  • Categorize data based on organizational value, and implement physical/logical separation of networks and data for different organizational units.
  • Require user interaction for end-user applications communicating with Websites uncategorized by the network proxy or firewall.
  • Implement application white-listing. Only allow systems to execute programs known and permitted by security policy. (See the FBI public service announcement from September 15, 2016, "Ransomware Victims Urged To Report Infections to Federal Law Enforcement.")
  • Organizations also should conduct a cyber-security risk analysis of the organization and have and test an incident response plan. 
  • Finally, organizations should take into account insurance coverage, including cyber-liability/cyber-extortion coverage.

Is There an Example of a Recovery Plan Specific to a Ransomware Attack?

The National Institute of Standards and Technology Guide for Cybersecurity Event Recovery includes an example of a recovery plan in the form of a playbook for a ransomware attack. (See the NIST's special publication, Guide for Cybersecurity Event Recovery.) While the guide applies to US federal agencies, it should be useful to any organization.

Could a Ransomware Attack Result in a Breach under HIPAA?

The Department of Health and Human Services (HHS) provided guidance in Fact Sheet: Ransomware and HIPAA that states:

  • A breach under the HIPAA Rules is defined as, "… the acquisition, access, use, or disclosure of [protected health information] PHI in a manner not permitted under the [HIPAA Privacy Rule] which compromises the security or privacy of the PHI." See 45 C.F.R. 164.402.6.
  • When electronic protected health information (ePHI) is encrypted as the result of a ransomware attack, a breach has occurred because the ePHI encrypted by the ransomware was acquired (i.e., unauthorized individuals have taken possession or control of the information), and thus is a "disclosure" not permitted under the HIPAA Privacy Rule.
  • Unless the covered entity or business associate can demonstrate that there is a "… low probability that the PHI has been compromised," based on the factors set forth in the Breach Notification Rule, a breach of PHI is presumed to have occurred. The entity must then comply with the applicable breach notification provisions, including notification to affected individuals without unreasonable delay, to the Secretary of HHS, and to the media (for breaches affecting over 500 individuals) in accordance with HIPAA breach notification requirements. See 45 C.F.R. 164.400-414.












eFraud Prevention™, LLC