The ongoing threat of ransomware

The National Crime Security Centre (NCSC) gives some detail on the ways ransomware is increasing in sophistication and scope.

The National Cyber Security Centre (NCSC) has recently (20 November) published an advisory on ransomware attacks,[1] looking at the changes in the way these attacks are being conducted. This blog post will summarise these findings and provide the Kindus perspective on how best to deal with ransomware.

For anyone unfamiliar with the term, ransomware refers to malicious software that will encrypt the victim’s files, making them inaccessible. In order to decrypt the files, a ransom will be demanded, typically made payable in almost untraceable cryptocurrencies.

Ransomware has started to ingrain itself into the public consciousness since 2016, particularly after the WannaCry attack in May 2017. Whilst affecting systems worldwide, the most high-profile victim in the UK was the NHS. The NHS was particularly vulnerable as many systems were still running Windows XP, which had not been patched since 2014. This resulted in widescale disruption including cancelled appointments, diverted ambulances and having to resort to paper records. According to the Department of Health and Social Care, the attack cost the NHS £92 million.[2]

The NCSC has noted the recent trend of ransomware attacks becoming more targeted. Cyber criminals appear to be putting more thought into perceived value of the victim’s data. For example, encrypting business-critical files and systems, whereas previous attacks took a more scattergun approach. There has also been a notable increase in attacks against Mac and Linux systems as opposed to purely Windows systems. All this indicates that ransomware is increasing in sophistication and scope.

The NCSC also gives some detail about the methods used for infecting systems with ransomware. Typical approaches include remote administration tools such as Remote Desktop Protocol (RDP), whereby cyber criminals have been able to exploit vulnerable RDP sessions by stealing login credentials and other sensitive data. The second main source of attack is through malware like Trickbot.

The advisory concludes with some useful advice on how best to mitigate the threat of ransomware, as seen below:

  • Protect your devices and networks by keeping them up to date.
  • Prevent and detect lateral movement in your enterprise networks.
  • Implement architectural controls for network segregation.
  • Set up a security monitoring capability.
  • Whitelist applications.
  • Use antivirus.

In addition to these suggestions, Kindus believes that staff training is fundamental in the prevention process. If staff are aware of the dangers of opening unknown attachments then a large proportion of attacks can be deflected before they cause any problems. Should you get into a situation where ransomware has infected your computer, we strongly advise you not to pay the ransom. Firstly, hopefully your data is already backed up in a separate location. Even if it is not, there are no guarantees that paying the ransom will decrypt your data. Paying the ransom only encourages future attacks.

For more information on Kindus’ security training services, please click here.

 

 

[1] National Cyber Security Centre (NCSC), ‘Advisory: Ongoing Threat to Organisations from Ransomware’ (20 November 2018).

[2] https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/747464/securing-cyber-resilience-in-health-and-care-september-2018-update.pdf [accessed 27/11/18].

More from Security

04/12/2024

Sitting Duck Attacks

The Sitting Duck attack revolves around taking control of a domain and then using it to distribute malware or as a source for phishing …

Read post

25/11/2024

Developers Hit By Compromised Software Packages

A Typosquat campaign uses slight variations on well-known names to mislead a user to access a rogue rather than genuine asset.  It is well …

Read post

04/11/2024

UK Data (Use and Access) Bill

The Data (Use and Access) Bill had its first reading in the Lords on 23 October 2024.  This step is merely a formal introduction …

Read post

28/10/2024

Zero-Day Attacks

In October 2024 Google Mandiant reported on 138 exploited vulnerabilities since 2023.  They concluded there had been an increase in the number and speed …

Read post

Sign Up

Sign up to our newsletter list here.

    Successful sign up

    Thank you for signing up to our newsletter list.

    Check your inbox for all the latest information from Kindus

    Categories