Ransomware continues to be a thorn in everybody’s side, with hackers continuing their unrelenting attacks despite the world being in the midst of a pandemic. An interesting article from bleeping computer brought to light some interesting information that many organizations are not aware of even after they feel they’ve dealt properly with a ransomware attack. The popular thought is that after a ransomware attack occurs, the attackers leave so that they won’t get caught. “Unfortunately, the reality is much different as threat actors are not so quick to give up a resource that they worked so hard to control.”
What actually happens is that a ransomware attack often occurs over an extended period of time, starting with the hacker breaching and accessing a network. Often, once a network is accessed, other tools are then implemented to gather login credentials and other valuable information. These credentials are then used to exfiltrate unencrypted files prior to deploying ransomware software. Once the ransomware is out in the open, even though victims may feel that the hackers have now left their system, the reality is that the hackers are possibly still stealing files AFTER the attack. The new mode of operation is that, instead of the hackers demanding ransom and running for the hills, they will demand the ransom and then continue lurking around on the network to ensure that they get a more positive outcome to their demands.
In the example provided by bleeping computer, a recent Maze ransomware attack on a San Antonio Aerospace company showed that the hackers were still operating within the company’s network after the fact when they leaked a document from the company’s IT department reporting on the ransomware attack that had just been perpetrated! Often, hackers are reading their victim’s emails on how they are dealing with the ransomware attack; even as ransomware negotiations are taking place.
The advice that is provided by the experts is that after detecting a ransomware attack, the company should first shut down their network and all computer systems running on it in order to prevent further encryption of data as well as to deny attackers access to systems. Once this is done, the company should look to a 3rd party cyber security company to perform a full investigation; with the expectation that this audit will provide information on corporate devices that may have persistent infections, other vulnerabilities, as well as detect any malicious software left behind by the hackers. The victim should be take on the assumption that their network was completely compromised and that even backup servers may have been infected. They should also look to a different method of communication, not tied to their network, just in case the hackers are still accessing the victim’s regular communication channels. Victims should also be mindful that even though they may need to completely wipe and rebuild there machines and servers, the hackers may have stolen their credentials so they should ensure that all of the previous credentials are changed in order to mitigate additional access by the hackers.
Unfortunately, the above is still all a result of the prevalent “Detect, Quarantine and Remediate” approach to network security. Wedge customers would not have to deal with the above case since they subscribe to the “Detect and Block” approach; stopping malware and ransomware in its tracks BEFORE they can enter the network. As well, Wedge’s solution goes one step further and is able to further guard your gateway by scanning for both incoming AND outgoing threats; thus would be able to detect malicious outbound communications from hackers should the threat already be present within the network. The big thing about the Detect, Quarantine, Remediate way of doing things is that it tries to solve the problem of malware after the fact. Once a network has been infected, in order to ensure that malware has been eradicated, the long process of a wipe and rebuild has to occur. Wedge’s solution is proactive in detecting and blocking attacks but also provides protection by scanning outbound content for malware should the threat be coming from within the network.
There is such a stark difference between a remediation approach and a prevention approach. Wedge Absolute Real-time Protection (WedgeARP) utilizes a proactive, rather than reactive way of dealing with malware; providing real-time threat protection through the use of patented Deep Content Inspection, along with orchestrated threat management with multiple layers of protection. WedgeARP is the first and only platform that can apply deep learning / machine learning based threat detection to the network content. It can detect and block in real-time sophisticated and growing numbers of new, previously unknown and customized or targeted malware variants. If you feel that a Detect and Block approach may be what your organization is looking to move to instead of continually dealing with remediation activities, contact our team at: info@wedgenetworks.com. Once you’ve experienced the difference in approaches, you’ll wonder why organizations are still stuck on the Detect and Remediate approach.
Main Website Links
Wedge DCI Search
Wedge Calendar
-
Recent Posts
- Wedge Networks Announces General Availability of its Innovative, Continuous Learning Analytics and Threat Intelligence Engine, WedgeIQ™ Nucleation Edition at Asia Tech Singapore
- Wedge Networks Teams up with Edgecore Networks to Offer Next-Generation Network Security WedgeCND™ Add-on Now Available on Edgecore ecCLOUD
- Wedge Networks to Participate at Mobile World Congress 2023
- Wedge Networks to Showcase Latest Innovation In Real-time Threat Prevention, WedgeIQ™ Nucleation Release, at WEST Conference in San Diego February 14-16th
- Wedge Networks Partners with Seaspring to Deliver Real-time Threat Prevention to the Bahrain & MENA Markets
Recent Comments
- Ram Bathala on Calgary’s Wedge Networks Looks to Channel for Enterprise Push with Malware-Blocking Product
- Eva on Milliseconds Versus Minutes – The Difference Between Prevention and Remediation
- Smithb on Wedge Adds AI for Better Malware Blocking
- Abram on Wedge Joins MEF to Boost World’s Third Network Security
- David Millar on 5G & IoT Dominate MWC16
Archives
- June 2023
- May 2023
- February 2023
- January 2023
- November 2022
- September 2022
- August 2022
- July 2022
- June 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- September 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- October 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- March 2018
- February 2018
- July 2017
- June 2017
- May 2017
- April 2017
- February 2017
- November 2016
- October 2016
- September 2016
- May 2016
- April 2016
- March 2016
- February 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- June 2015
- May 2015
- April 2015
- March 2015
- December 2014
- November 2014
- October 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- April 2013
- November 2012
- October 2012
- September 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- June 2011
- May 2011
- February 2011
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
Categories
Meta
Kaspersky ThreatPost
- Student Loan Breach Exposes 2.5M Records August 31, 2022
- Watering Hole Attacks Push ScanBox Keylogger August 30, 2022
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms August 29, 2022
- Ransomware Attacks are on the Rise August 26, 2022
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras August 25, 2022
- Twitter Whistleblower Complaint: The TL;DR Version August 24, 2022
- Firewall Bug Under Active Attack Triggers CISA Warning August 23, 2022
- Fake Reservation Links Prey on Weary Travelers August 22, 2022
- iPhone Users Urged to Update to Patch 2 Zero-Days August 19, 2022
- Google Patches Chrome’s Fifth Zero-Day of the Year August 18, 2022