How to Safeguard Against Ransomware Attacks

| View Article
The latest ransomware outbreak dubbed “Petya” or “GoldenEye,” which experts feel originated, albeit unknowingly, from a supply chain vendor in the Ukraine or Russia, poses an unusual threat.


The new version possesses worm-like capabilities which allows it to move laterally across infected networks. It freezes a user’s computer, encrypts the data, and demands an untraceable ransom be paid in the digital Bitcoin currency.


The malware reportedly hit the Chernobyl nuclear power plant in the Ukraine as well as Russia’s largest oil producer before infiltrating a Danish shipping company, a British advertising agency, and U.S. pharmaceutical company Merck and Co., among others.


The US Department of Homeland Security has advised victims not to pay the ransom, saying there is no guarantee that access to files would be restored.



As was the case in a similar episode in May, the latest ransomware attack purportedly used attack code that is said to have originated from the U.S. National Security Agency and leveraged the same exploit, which uses a Windows Server Message Block flaw, to spread on networks. Microsoft had issued a “critical” security bulletin back in March to correct the flaw.


What is particularly disturbing about the most recent ransomware attacks is that they are distributed in the guise of a a trusted “third-party update.”  The initial infection appeared to have involved a software supply-chain threat involving the Ukrainian company M.E.Doc, which develops the tax accounting software, MEDoc. Although this vector was speculated at length by news media and security researchers—including Ukraine’s own Cyber Police—there was only circumstantial evidence for this vector.  Microsoft now has evidence that a few active infections of the ransomware initially started from the legitimate MEDoc updater process.


In a discussion on Windows Security, the new Microsoft Malware Protection Center blog, community member Chris Smith argues that 3rd parties should not be building update mechanisms at all. “This entire attack vector exists because the platform doesn’t have a consistent distribution architecture other than for base updates. Every vendor builds an updater which increases the attack surface. Linux vendors, Apple OSX and most mobile vendors have nailed this to some degree,” said Smith.




The counter-argument is that malicious software might still be embedded in Trojan-horse fashion on software distributed though the OS provider.  WordPress, for one, has seen counterfeit plugins containing hacks posing as legitimate software and illicitly posted to its proprietary directories or Codex.


There are two types of ransomware – lockscreen ransomware and encryption ransomware.

Lockscreen ransomware shows a full-screen message that prevents you from accessing your PC or files. It says you have to pay money (a “ransom”) to get access to your PC again.

Encryption ransomware changes your files so you can’t open them. It does this by encrypting the files – see the Details for enterprises section if you’re interested in the technologies and techniques we’ve seen.

Older versions of ransom usually claim you have done something illegal with your PC, and that you are being fined by a police force or government agency.

Ransomware can get on your PC from nearly any source that any other malware (including viruses) can come from. This includes:

  • Visiting unsafe, suspicious, or fake websites.
  • Opening emails and email attachments from people you don’t know, or that you weren’t expecting.
  • Clicking on malicious or bad links in emails, Facebook, Twitter, and other social media posts, instant messenger chats, like Skype.

It can be very difficult to restore your PC after a ransomware attack – especially if it’s infected by encryption ransomware.

That’s why the best solution to ransomware is to be safe on the Internet and with emails and online chat:

  • Don’t click on a link on a webpage, in an email, or in a chat message unless you absolutely trust the page or sender.
  • If you’re ever unsure – don’t click it!
  • Often fake emails and webpages have bad spelling, or just look unusual. Look out for strange spellings of company names (like “PayePal” instead of “PayPal”) or unusual spaces, symbols, or punctuation (like “iTunesCustomer Service” instead of “iTunes Customer Service”).

 

 

 

 

To protect yourself against ransomware, Microsoft has issued advisories for the Windows platform.

The cardinal rule for all platforms is that, in a cloud based ecosystem, it is considered a best practice to perform daily backup files with a cloud storage service that keeps a history or archive of your files, such as Microsoft OneDrive which is now fully integrated into Windows 10 and Windows 8.1, and Microsoft Office or iCloud on the Apple platform. Dropbox, Box.com and SugarSync are other automated backup services that extend across multiple platforms. [24×7]

Category: Advisor X

About the Author (Author Profile)

Larry Sivitz is founder, publisher and managing editor of Seattle24x7, the founder of SearchWrite Search Marketing, an SEO, PPC and Social Media Thought Leader, and an SPJ award winner for Seattle magazine.

Moon on Tech: Cary is a supporter of city-owned municipal broadband and is eager to develop policies that treat broadband as a public utility like water or sewer. However, according to WTIA, it was clear she did not have a full grasp of the market dynamics, the economics, or the regulatory framework in this complex matter. She was quite eager to study the matter further and refine her point of view.

Cary has endorsements from The Urbanist and The Stranger.



The city of Seattle’s primary election is August 1st. [24×7]

Spotlight Jobs

Latest Press Releases

  • Archives:

  • Categories:

  • Tags:

Tag Cloud