A Framework for Ongoing Ransomware Protection - LiveOnNetwork

A Framework for Ongoing Ransomware Protection - LiveOnNetwork


A typical ransomware attack can be divided into four stages: Pre-execution, Pre-damage, damage, Post-damage.

Ransomware Prevention and Response Checklist

Pre-Execution

1: Keep ransomware away from system endpoints by preventing delivery.
Examples of solutions that can help:
  • Gateway defenses: firewalls, email, and spam filtering
  • User anti-phishing tests and awareness training programs
  • Exploit prevention: patch management, ad blockers
Some attacks may penetrate these defenses, especially due to human error.

2: Block ransomware payloads from executing.
Examples of solutions that can help:
  • File scanning and filtering, including antivirus
  • Program isolation solutions, including sandboxing tools
  • Application whitelisting

Pre-Damage

Step: Stop executed ransomware from doing harm.
Examples of solutions that can help:
  • Runtime protection that identifies malicious behavior and stops it automatically before any damage is done.
Stopping attacks at runtime is your last opportunity at ransomware prevention. The next two groups of solutions help you react to effective infections by quickly identifying and recovering from them.

Damage

Step: Isolate ransomware infections to prevent them from spreading.
Examples of solutions that can help:
  • Security Information and Event Management (SIEM) systems can identify security alerts or network events signaling a ransomware attack and help security teams contain it.
  • UEBA and incident response tools can identify ransomware attacks even if the attack or malware signature is unknown. Next-generation SIEMs come with UEBA built in.
  • Setting up monitoring on file servers to notify of infections
  • Restricting admin and usage rights to sensitive files

Post-Damage

Step: Recover quickly without paying the ransom.
Examples of solutions that can help:
  • Backup, as part of a robust disaster recovery plan
  • Decryptor tools
  • Malware removal tools