📜 ⬆️ ⬇️

An integrated approach to protection against targeted attacks and extortionate software such as Ransomware

annotation


Over the past few years, the issue of protection against automated targeted attacks has become acute in the information security market; however, in the general sense, a targeted attack at first appeared to be the result of a long and professional work by an organized group of cybercriminals in order to obtain expensive critical data. Currently, against the background of the development of technologies, popularization of open-source forums (for example, Github, Reddit) and Darknet, which provide source codes of malicious software and describe step-by-step how to modify it (to make it impossible to detect it with signature-based analysis) and infect hosts. simplified. For the implementation of a successful attack, accompanied by disastrous consequences for the owners of automated and information systems, a rather unqualified user and enthusiasm in parsing the material provided on the Internet / Darknet.

The motive for such criminal activity is profit. The easiest, and therefore most common way, is to infect network hosts with malware such as Ransomware. Over the past 2 years, its popularity is growing rapidly:


In early 2017, the leading manufacturers of information security products (Kaspersky Lab, McAfee Labs, SophosLabs, Malwarebytes Labs, TrendMicro, etc.) called Ransomware one of the main threats to information security for government and commercial organizations of various fields of activity and scope. And as history shows, they were not mistaken:


There are a lot of cases of targeted attacks to infect Ransomware. The main purpose of the attackers are systems based on the Windows OS family, however, there are various versions of Ransomware for the OS of UNIX / Linux families, MacOS, as well as iOS and Android mobile platforms.
')
With the development of ransomware appear and means to counter them. First of all, this is an open project No more Ransom! (www.nomoreransom.org), which provides victims of attacks with means to decrypt data (in the event of an encryption key being opened), and secondly, specialized open-source means of protection against encryption viruses. But they either analyze the software behavior by signatures and are not able to detect an unknown virus, or block malware after it affects the system (encrypting a part of the data). Specialized Open-source solutions applicable by Internet users on personal / home devices, large organizations that process large amounts of information, including critical ones, need to provide comprehensive proactive protection against targeted attacks.

Proactive protection against targeted attacks and ransomware


Consider the possible vectors of access to the protected information located on the server or the automated workplace of the user:


To reduce the likelihood of threats for each type of access to protected information, it is necessary to ensure the implementation of a set of organizational and technical measures to protect information, a list of which is shown in the figure (see Figure 1)


Figure 1. Proactive protection measures against targeted attacks and ransomware

Organizational protection measures against targeted attacks and ransomware


The main organizational measures for proactive protection against targeted attacks and Ransomware include:


Technical measures for protection against targeted attacks and ransomware


Technical measures of proactive protection against targeted attacks and Ransomware are taken at the network level and at the host level.

Network Proactive Protection Measures



Host level proactive security measures



Other measures to protect against ransomware viruses


In addition to the measures listed above, the following can help prevent a targeted attack in the corporate network:


Prioritization of protection measures against ransomware viruses


Reliable comprehensive protection against targeted attacks is provided by a set of organizational and technical measures, which are ranked in the following groups:




Figure 2. Prioritization of protection measures against the ransomware Trojan

Ransomware protection measures for end users


The threat of infection with an extortioner virus is also relevant for end-users of the Internet, for whom individual measures to prevent infection are also applicable:


Vulnerability of mobile devices (Android, iOS)


“Smart” mobile devices (smartphones, tablet computers) have become an integral part of life: the number of activated mobile devices, mobile applications and the volume of mobile traffic increases every year. If earlier mobile phones stored only a database of contacts, now they are storage of critical data for the user: photos, videos, calendars, documents, etc. Mobile devices are increasingly being used in the corporate sector (annual growth of 20-30%). That is why the interest of intruders is growing towards mobile platforms, in particular, from the point of view of extorting money with the help of Trojans. According to Kaspersky Lab, in the first quarter of 2017 extortionists accounted for 16% of the total number of malware (in the fourth quarter of 2016, this value did not exceed 5%). The largest percentage of Trojans for mobile platforms is written for the most popular mobile operating system, Android, but for iOS there are similar ones.

Protection measures for mobile devices:


findings


The simplicity of implementation and the low cost of cyber-attack organization costs (ransomware, DDoS, attacks on web applications, etc.) leads to an increase in the number of cybercriminals while reducing the average technical level of an attacker. In this connection, the likelihood of the realization of threats to the security of information in the corporate sector and the need for providing comprehensive protection increase dramatically.

Therefore, we at Informzaschita focus on modern challenges of information security and ensure the protection of the client's infrastructure from the latest, including unknown threats. Creating and implementing complex adaptive models of countering information security threats, we know how to predict, prevent, detect and respond to cyber threats. The main thing is to do it in a timely manner.

Author: Evgeny Borodulin, Chief Architect, Informzaschita
e.borodulin@infosec.ru

Source: https://habr.com/ru/post/331700/


All Articles