Go to content

Cybersecurity

How Should Companies Handle Ransomware?

Chris Ayliffe

Chris Ayliffe


Chief Marketing Officer

03.03.23


9 min read


The rise of ransomware has been a major concern for companies in recent years. It is estimated that more than 75% of businesses with an online presence were targeted by ransomware in 2021. This might sound like a lot, but if you broaden the definition of attack to include any kind of cyber attack, that figure would be closer to 100%.

Ransomware has the potential to completely cripple a business, and for that reason, it's something all companies should be aware of, but what exactly is ransomware? How should a company respond if they are targeted? Can companies do anything to prepare against a ransomware attack?

We've got you covered with this comprehensive guide to handling and preparing for potential ransomware attacks.

What is Ransomware?

A malware hacker using a lit up keyboard

 

Ransomware is a type of malicious software that seeks to encrypt important files on computers until a ransom, usually in the form of money or cryptocurrency, is paid. It can cause serious damage to online data and systems, potentially leading to extended system downtime and the loss of important documents. This type of attack has become increasingly common since the onset of the digital age and shows no sign of slowing anytime soon.

What is the Threat of Ransomware to Your Company?

Ransom spelled out in scrabble pieces

Ransomware has the potential to wreak havoc on a business, your company included. Not only is ransomware computer malware that locks up your systems, but some attacks can even encrypt and lock up data, preventing you from accessing important paperwork, contracts and financial information. The result? Your operations could come to a grinding halt until you settle the ransom demand made by the attackers.

How Does Ransomware Work?

A ransomeware attack visual on a computer screen

The basic principle of ransomware is that it finds a way to get into a system and then holds it to ransom. In simple terms, ransomware basically works by trashing your computer's security measures, getting access to systems and encrypting your files. That means you can no longer open or modify any of the corrupted files until you have provided the required ransom. Ransomware has become an incredibly effective way for criminals to make money quickly and anonymously.

In recent years there have been some notable ransomware attacks.

LockBit

According to a recent report, the LockBit ransomware has been targeting businesses in the United States and Europe. The ransomware encrypts victims' files and then demands a ransom for the decryption key. There have been several high-profile cases of businesses being infected with LockBit, including a hospital in Germany and an energy company in Italy. Experts believe that this particular ransomware is being distributed through phishing emails.

Conti Ransomware Family

The Conti ransomware family is a relatively new form of malware that has emerged in the past few months. According to security researchers, this particular family of ransomware is being used to target businesses in Europe, specifically those operating in the healthcare and finance sectors. What sets this family apart from other forms of ransomware is its ability to spread quickly across networks using Remote Desktop Protocol vulnerabilities. If your business is targeted by this ransomware, it can quickly infect other systems and encrypt their data, making it impossible to access until a ransom is paid.

Blackcat Ransomware

In 2021, the Blackcat ransomware attacked a number of businesses across Europe. It was spread through phishing emails that contained malicious links and attachments.

REvil Ransomware

The REvil ransomware attack is one of the most notorious cyberattacks in recent years, targeting businesses across multiple industries. 

PYSA Ransomware

The PYSA was first detected in 2021 and has been targeting businesses around the world with devastating results. It uses sophisticated techniques to spread across networks, making it difficult to detect and contain. It also leverages public cloud services to gain access to networks, further complicating security measures.

What Are The Most Common Types of Ransomware?

Common types of ransomware displayed in computer code

There are a few different kinds of ransomware. The most common types of ransomware are crypto-ransomware and locker ransomware. Crypto-ransomware encrypts files on the system, making them unreadable until a ransom is paid. Locker ransomware prevents users from logging into their computers or networks by locking up an entire system until a payment is made. Within the world of ransomware, there are some subcategories depending on the main method of getting into a system or what the attacker is trying to achieve within it.

Phishing Emails and Social Engineering

An example of a phishing email

Phishing emails are disguised as legitimate messages from people or organisations, but they actually contain malicious links or attachments that can install ransomware on your system. Social engineering is when attackers attempt to manipulate users into giving up sensitive information or taking actions that would give them access to the system. This can also be done via phone calls and text messages. The attackers may pretend to be customer service representatives or technicians in order to get what they want. Social engineering often relies on targeting vulnerable people who might not be very conscious about cybersecurity. 

Credential theft

The importance of credential threat

Credential theft is a type of attack where attackers steal user credentials such as usernames and passwords. This can be done through phishing emails, malicious links, social engineering, and other methods. Credential theft is one of the most dangerous forms of ransomware, as it can lead to stolen intellectual property, financial loss and reputational damage.

Operating System/Software and Other Backend Vulnerabilities

Ransomware in the form of operating system and software vulnerabilities is a type of attack where attackers exploit weaknesses in systems or applications to gain access and encrypt data. This can be done by exploiting unpatched security flaws, using malicious software or malware, and taking advantage of weak passwords or weak encryption methods.

Preexisting Malware

Pre-existing malware on someones computer found

Preexisting malware is malicious code that has been designed to gain access to a system without the user's knowledge. It often disguises itself as legitimate software in order to avoid detection, and it can be used to install more ransomware on a system. Preexisting malware is one of the most difficult forms of ransomware to detect and prevent, as it often takes advantage of existing vulnerabilities in operating systems or applications.

What Steps Are There in a Normal Ransomware Attack?

A hacked computer screen with lines of vertical code

Although no two ransomware attacks are the same, there are some common steps in the process.

Infection

An infection symbol in black on a yellow background

The first step of any ransomware attack is for the malware to gain access to a system. This is usually done through phishing emails, malicious links, social engineering and other methods.

Encryption

Computer encryption displayed on a laptop screen

Once the malware has gained access to a system, it will encrypt files and documents that are stored on the system.

Ransom

A hacker seeking ransom at his laptop

The attacker then sends out a notification demanding payment in order to unlock the encrypted files or networks. This demand is usually made in the form of cryptocurrency, such as Bitcoin or Ethereum.

Payment

Payment requests from ransomware attacks

At this point, the victim must decide whether they want to pay the ransom or not. They often do pay it because they don't feel they have a choice.

Decryption

Decryption symbolised with a person opening a safe

Once the ransom is paid, the attacker will then unlock the encrypted files and/or networks. This isn't always the case, though. Sometimes attackers will simply take the money and delete the files or leave them encrypted. Attackers have also been known to 'up the ransom' when a victim seems to be ok with paying it.

How Can Companies Lower Their Risk of Ransomware?

How companies can lower their risk of ransomware attacks

The available technologies to detect ransomware aren't really 100% effective, so it is advisable that all businesses have some sort of strategy or system in place to help lower the risk of a ransomware attack.

There are organisations like the Cybersecurity Infrastructure Security Agency (CISA) in the United States and The European Union Agency for Cybersecurity (ENISA) that provide useful guidance and resources to help protect against ransomware threats.

Organisations can also consider implementing a comprehensive cybersecurity strategy which includes the following.

Protection and Prevention

Protecting and preventing ransomware attacks

Organisations should ensure that they have up-to-date antivirus software and patch regularly to reduce the risk of ransomware attacks. They should also monitor their networks on a regular basis to detect any unusual activity. Furthermore, it is important for companies to establish strong passwords and multi-factor authentication as an extra layer of security.

Incident Response

The importance of incident response to ransomware attacks

Companies should have an incident response plan in place that outlines the steps they need to take if they are hit with a ransomware attack. This should include contacting appropriate authorities and having an established procedure for recovering data and systems.

Removal and Recovery

The importance of recovery and removal of ransomware attacks

A removal and recovery process looks at quickly and effectively regaining control of files or networks.

What Should You Do if You Are Attacked by Ransomware?

What should you do if you are attacked by ransomware

If you are hit with a ransomware attack, it is important to stay calm and not panic. It is also essential that organisations notify law enforcement authorities as soon as possible. Try to not think about the ransom that has been requested and instead run through the following checklist.

Contact Your Incident Response Team

Contact your incident response team in response to ransomware attacks

Make contact with any incident response team and start the process of triaging systems that have been impacted by the attack.

Identify Infected Systems

Identifying infected systems with ransomware

Figure out exactly which systems have been affected by the attack and make sure they are isolated immediately.

Don't Make Any System Changes

The importance of not making system changes when ransomware attacks hit

Do not under any circumstances make any system changes after a ransomware attack has been discovered. Changes made to a system that has been infected with ransomware could limit the ability to collect evidence later.

Assess The Integrity of your Backup Systems

Assessing your backup systems

Check any backup systems to determine if the data contained in them can still be used for recovery or if it has also been infected.

Contact Your Legal Team

Contact your legal team after ransomware attacks

Inform your legal team of the situation. They will most likely have procedures that they would also like you to follow in a ransomware attack situation.

Keep Managers and Senior Leadership Team Informed

Keeping managers and senior leader informed of ransomware attacks

Make sure that all managers, senior leaders and relevant stakeholders are informed of the situation. Not only does this step ensure that everyone is informed, but it can also help to remind colleagues to be vigilant.

Should you pay the ransom if you are the victim of a ransomware attack?

A person counting cash to pay to a ransomware attacker

Paying the ransom is a difficult decision, and it's advisable to discuss this with your legal team first. Generally, experts advise against paying ransoms as there is no guarantee that victims will get their data back or that attackers won't simply demand more money. Even law enforcement agencies like the FBI and Interpol don't recommend paying attackers in the hopes of regaining control and restoring access to data.

As mentioned earlier, no two attacks are ever the same, and the decision to pay a ransom should never be made without first engaging with law enforcement and experts.

Who should you notify if you have been the target of a ransomware attack?

Who should you notify when you've been the target of ransomware

If you have been the target of a ransomware attack, it is important to notify the authorities as soon as possible. This includes local law enforcement, cyber security experts and other relevant organisations such as your internet service provider or cloud provider if applicable. 

It is also important to inform any third-party vendors or partners who may have access to your data, systems or networks. This will help to alert them and ensure that they are also taking steps to protect themselves from this attack. In addition, notifying the authorities can help with investigations into the incident and can assist in bringing the attackers to justice.

Are There Any Other Resources That Can Help You With Ransomware?

A ransomware hacker in a black hoody sitting with two laptops

Yes, there are a number of resources available to help organisations handle ransomware attacks. These include cybersecurity experts and legal teams who have experience in dealing with such threats. There is also a range of online resources that can provide guidance on best practices for responding to an attack and for putting preventative measures in place to make sure your organisation is as safe as possible. Additionally, organisations can also look into cyber insurance policies, which may provide financial protection in the event of a ransomware attack. 

CISA has created a very handy Ransomware Guide that is based on research and expert advice. Equally, ENISA (the European equivalent of CISA) has also put together their own version based on experience and guidelines in Europe.

How a Vulnerability Management System Can Help defend against ransomware attacks

Nanitor logo

A vulnerability management system is an important tool for detecting and responding to ransomware attacks. An effective vulnerability management system allows you to monitor all cybersecurity issues across your organization’s assets in a timely manner, and support your ability to remediate quickly.

For example, a vulnerability management system allows organisations to quickly identify vulnerable systems and focus efforts on fixing patches before they can be used by attackers. Additionally, it provides visibility into any malicious activity on the network and can alert organisations if suspicious activity is detected. This enables businesses to take appropriate action in a timely manner, which can be essential in containing the attack.

Cybersecurity is a constantly changing, yet integral element of operating as a business in an incredibly interconnected world and investing in some sort of vulnerability management system will put your business in the best possible position, should you be unfortunate enough to be targeted by ransomware. If you would like to find out more about how a system like this can give you more peace of mind, schedule a free demo with Nanitor today

Conclusion

Keeping your systems safe from ransomware attacks

Keeping on top of your cyber security is essential in today's digital environment. By taking the time to understand their potential risk points, implementing preventative measures like a vulnerability management system and notifying law enforcement quickly if an attack occurs, companies can minimise the damage caused by ransomware and protect their data, systems and networks.

By taking proactive steps and following best practices, organisations can help to keep their data safe and secure. Taking the time to plan, prepare and understand your organisation's risk points can go a long way in helping prevent or mitigate damage from ransomware attacks. With the right tools and resources, companies can protect themselves from this increasingly common threat.