Ransomware Part 1: Is this an Epidemic?

Ransomware Part 1: Is this an Epidemic?

The words ‘ransomware’ and ‘epidemic’ occur too frequently in the same sentence these days, prompting executives to prepare their organizations to survive this latest cyber threat. The Center for Disease Control and Prevention (CDC) provides the following definition of an epidemic.

 

“Occasionally, the amount of disease in a community rises above the expected level. Epidemic refers to an increase, often sudden, in the number of cases of a disease above what is normally expected in that population in that area. Outbreak carries the same definition of epidemic, but is often used for a more limited geographic area.”

 

If pundits and researchers are correct regarding their assessments of ransomware as an epidemic (or greater), the keys to preventing wide-spread infections are rapid mobilization, coordinated response plans, and dissemination of information. 

 

  1. Organizations should be mobilizing teams internally to understand the prevalence of the threat and attacker intentions. Coordination of teams is mandatory for an organization’s response capability and survivability.

     
  2. Security operations, incident response and management should have a vetted, coordinated response plan in place, including the following preventive measures:
    1. Working backups (preferably, online and out-of-band). All backup capabilities are not equal. We cannot stress this step enough. Ransomware attacks reveal that backups are not functioning at effective levels in numerous organizations.
    2. Detection and prevention controls in place.
    3. Data classification and valuation of data.
    4. Communication trees and rules of engagement (ROE) with ransomware dealers. In the case of a successful attack, organizations can:
      1. Attempt to remove the compromise.
      2. Pay the ransom or attempt to negotiate (nothing guaranteed).
      3. Do nothing at all (the FBI has recently reconfirmed its stance to not pay ransomware dealers).

         
  3. Communicate and widely disseminate information about ransomware criminals. Organizations should have strong security awareness programs. Focus on phishing awareness is crucial. Attackers typically target unsuspecting users as entry points into organizations.

     
  4. Learn from the experiences of others to shore up on defenses. Many organizations targeted by ransomware campaigns have shared valuable insights combating this wave of attacks.

     

 

If ransomware truly is the newest cyber epidemic, executives should waste little time investing in preparedness to defeat it.

 

In our next post we will examine how different strains of ransomware can infect your environment.

Mark Arnold
Solutions Research Analyst
Mark Arnold is a senior research analyst in the solutions research and development group within Optiv’s Office of the CISO. In this role he specializes in developing strategy deliverables and frameworks to help industry verticals mature and grow efficient security programs. Arnold’s current research focuses on endpoint and cloud security.
Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?