Menu
Ransomware takes malware from bad to worse

Ransomware takes malware from bad to worse

To thwart attacks like CryptLocker, you need a multipronged defense; new technology doesn't hurt either

Targeted email attacks (called spear phishing) with harmful links or attachments containing malware are an ever-increasing threat. These attacks are part social networking and part sophisticated technical effort to penetrate companies' defense systems. Traditional security deployments, in many cases, aren't prepared for these kinds of attacks.

The weakest link of any network is the user. But it's not always their fault. If a person receives an email from a real co-worker with a link, how can that person know the link will send them to a zero-day threat or that the attachment is a CryptoLocker attack?

After you train your users, they will have a good amount of fear and how-to ideas in mind, but over time they will forget or get sloppy -- and it takes only one or two clicks to pull CryptoLocker or similar threats into your environment. CryptoLocker is especially insidious malware because it encrypts all files -- documents, databases, photos, and so on -- with military-grade encryption unless you pay a ransom. Also, there is only one key to decrypt -- and the attacker is holding and asking money for it. Overall, ransomware is getting smarter.

You need to look at putting protections in place that checks links and scans email for malware as standard.

It's easy enough to scan email as it comes in and look for known viruses and such. What's hard is thwarting the kinds of sophisticated attacks where truly devastating tools like CryptoLocker are used: Someone sends a link that, at the time it comes through, points to a legitimate and safe server. But later, that link is switched by the attacker on the server side to a harmful location. There is typically no recheck in place when a user clicks a link in their email.

There should be -- and there can be.

You need email protection that covers the full lifecycle of a message, for as long as that message exists and there is a link to be clicked, when clicked the system will ensure the URL is still pointing to a safe location.

Tools for lifecycle malware detection carry different names, including targeted threat protection (TTP), targeted attack protection (TAP), and click-time link scanning. Whatever you call it, you want it in place.

You also want to scan all your systems and data stores to see if anything has already snuck through and is lurking to cause damage later. You have plenty of tools to do that, such as Malwarebytes Antio-Malware, which is what I use.

What happens if you are infected by ransomware? You have two options:

  • Pay the ransom and get back to work
  • Restore from backup, assuming it wasn't infected too

The problem with paying the ransom is that you tell the bad guys, "If this happens again, I will pay you," so you go on the list of repeat targets, likely for a higher ransom amount. Certainly, if you don't have secured backups of your data, you need to start making them.

When all is said and done, three items are necessary to protect your organization from modern-day phishing attacks:

Don't put it off any longer!

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags Targetsecuritymalware

Slideshows

Top 50 defining moments of the New Zealand channel in 2016

Top 50 defining moments of the New Zealand channel in 2016

Reseller News looks back on a tumultuous 12 months for the New Zealand channel, assessing the fallout from a year of sizeable industry change. Whether it be local or global mergers and acquisitions, distribution deals or job changes, the channel that started the year differs somewhat to the one set to finish it - Reseller News assesses the key moments that made 2016.​

Top 50 defining moments of the New Zealand channel in 2016
​Hewlett Packard Enterprise honours high achieving NZ channel

​Hewlett Packard Enterprise honours high achieving NZ channel

Hewlett Packard Enterprise honoured its top performing Kiwi partners at the second running of its HPE Partner Awards in New Zealand, held at a glitzy ceremony in Auckland. Recognising excellence across eight categories - from distributors to resellers - the tech giant celebrated its first year as a standalone company, following its official split from HP in 2015.

​Hewlett Packard Enterprise honours high achieving NZ channel
Nutanix treats channel partners to Christmas cruise

Nutanix treats channel partners to Christmas cruise

Nutanix recently took to the seas for a Christmas Cruise around Sydney Harbour with its Australia and New Zealand staff, customers and partners to celebrate a stellar year for the vendor. With the sun out, they were all smiles and mingled over drinks and food.

Nutanix treats channel partners to Christmas cruise
Show Comments