Malware and Ransomware Attacks : Should You Pay The Ransom? What To Do If Your Business Is Hacked?

Malware attacks and removal

Advancements in technology do not come without the existence of any threats. As the number of people online each day increases significantly, threats grow more omnipresent on the internet. Ever since the birth of the online sphere, there has always been a great interest in securing these networks from cyber attacks such as malware, ransomware attacks.

An estimated 30 million attacks happen on cyberspace annually, costing individuals, corporations, and governments billions each year. Damages can range from small scale account attacks to large scale business breaches that leak sensitive information to the public. Such damages are why investing in cybersecurity is essential for everyone.

The Silent Killer: Malware

There is no way to stay completely invisible from online threats. Although there are existing methods to discourage hackers from accessing your information, threats like malware are always present. Malware is a term coined to describe malicious software that makes its way onto digital devices through programs created by hackers on the web.

Malware includes things like spyware, bots, rootkits, worms, and other computer viruses. These find their way into computers through visiting shady websites and signing up for strange offers online. Spyware is mainly characterised by its ability to track the activity on a specific device. Bots can hack your accounts online, perform DDoS attacks, and even mess around with particular processes on business websites. Rootkits allow hackers to control a device remotely to steal information, allowing worms to spread through your networks to access files.

Malware Versus Ransomware: What’s the Difference?

Malware is a more powerful force that can damage industries and disrupt entire online environments through hacking and sensitive information leaking. Ransomware is a more targeted approach that aims to take control of people’s computers and lock software and files. To get files back and regain access to a computer, the ransom attacker will ask for a payment. Supposedly, once they receive the payment, they will send a unique key to release it.

Ransomware victims usually access these through ransom emails that contain links. These emails pretend to offer a free item or change a password to an old account. Many emails have become more advanced to look indistinguishable from legitimate ones, which means checking the email address of the sender is a must.

When a person’s email address is hacked, the hackers will likely use it to send more ransom links to other addresses in a person’s contact list.

Ransomware payment

Should you pay the ransom?

There is no one way to answer this question. Several businesses and county governments that have paid ransom get their decryption keys to resume normal operations. On the contrary, there are calls from security experts and governments to never pay ransom.

The decision to pay ransomware demand should not be taken lightly. It comes with acceptance of several risks and in coordination with legal counsel, cyber insurance and security experts.

Should you decide to pay the ransom, you need to be aware of the following key factors:

  • You could be targeted again in the future
  • There is no guarantee that you will get your data decrypted
  • Your systems may still be infected
  • You may be paying cyber criminals who are carrying out illegal activities just like your incident

A quick search into the search engine should show you attackers publicly threaten to leak the data in case they are not paid. Irrespective of the ransomware payment decision, it may take a while to return to normal operations.

Defence in Depth Cybersecurity Strategy

There is no single solution to help you completely protect your organisation against malware. Defence in depth approach relates to using layered defence that offers more opportunities to detect and prevent malware. This helps to stop malware before it infects the target system or networks. It’s more about how to limit the impact of malware or ransomware attack, and responding quickly. Speed is the key, that only comes after preparation and practice. Therefore, your organisation must have people, processes and technology acting together to limit the impact of attacks.

Malware Attack Protection

Cyphere provides the following top tips against malware and ransomware attacks:

Tip 1: Prevent Malware Delivery

Preventing malware from being delivered to your systems greatly reduces the malware and ransomware threat.

Email and web filtering to allow required file types and data expected by recipients. By blocking suspicious websites and continuous inspection of internet content, malware transmission can be stopped before it reaches your internal systems. Use DNS based filtering techniques to stop such threats.

Secure remote access is important to add layered protection for networks. By restricting RDP access to internal systems and enforcing VPN access with multi-factor authentication greatly reduces the attack surface of remote access points into the network. Ensure multi-factor authentication is enforced on all email accounts.

Tip 2: Prevent Malware Infection

It is important that internal systems and devices are configured to prevent malware execution. In line with defence in depth approach, follow secure hardening practices for operating system builds in your environment. For example, Windows family may have different settings for certain Operating Systems, however, overall secure hardening baselines should be applicable to entire Windows OS family. This includes separate baselines for servers and desktops.

Patch Management is an important mitigation that ensures all exploitable bugs in your products are patched as soon as possible. Ensure that security updates are installed as they become available from product vendor.

Scripting environments should have restrictions to avoid the execution and spread of malware. This includes disabling Office Macros or limiting scripting environments using AppLocker enforced via group policy. Once disabled, ensure that users cannot re-enable them.

Tip 3: Limit the Impact

Use the principle of least privilege to provide remote access with only low privilege accounts to login. There should be an approval process in place where users are required to escalate privileges, and this must be performed on need only basis. All escalated privileges should be time limited and revoked upon task completion.

Regularly review permissions for all the staff including internal and external employees. This regular review of all user permissions limits malware’s ability to spread around the network. Do not allow IT teams and other privileged user groups to perform corporate tasks such as web, email with privileged accounts. Create separate accounts for corporate and production environments.

Segregate obsolete systems from the rest of the network to maintain a small attack surface. Obsolete systems are no more supported by their vendors; therefore, no security fixes are available for the bugs exploited by cyber criminals.

Tip 4: Education

User education and awareness training plays key role in stopping malware from being delivered and/or infecting other systems within the network. Cyber security importance in the user training should address at the least these facts:

  • Defending against phishing
  • Strong authentication practices
  • Securing your devices
  • Reporting incidents

There should be zero exceptions for this awareness training exercise. Specifically, cyber criminals often target senior management staff due to their importance within the business. Therefore, no exceptions should be made that could prove costly to the business later.

Organise regular trainings with engaging content about ongoing issues. Topics such as remote working securely, insider threats, cyber security tips for businesses in easy to understand language should be included.

Consider your supply chain to ensure better cyber security posture across business partners, suppliers and other third parties. Small business should consider defining policies for supply chain parties based on the risks attached to data access, storage and consumption.

Tip 5: Backups

Ransomware attacks actively target backups to increase their likelihood of payments. Make regular backups of most important data to the organisation. Find out which data is critical to the organisation, and test backup data restore regularly to ensure it is working as expected.

At the least, create one offline backup that is stored at a different location (offsite) from your network and systems. Utilise cloud services designed to protect backups where possible.

Be prepared

It is important to be prepared than the saying ‘we are too small’. This isn’t applicable as malware and ransomware attacks target businesses irrespective of their size. More often small businesses are targeted due to lack of attack preparedness. Identify the critical assets and determine the impact in case your business is under attack. Identify your legal and regulatory obligations and incident management plan to prioritise system recovery. Identify the attack vectors possible in your business context, and mimic the exercise by carrying out penetration testing of your networks and applications using third party penetration testing companies. This ensure you assess and analyse the gaps identified by security experts, followed by remediation plan to mitigate these risks. Acting on the penetration test findings shall minimise the attack surface and demonstrates data security commitment to your supply chain.

What to do when your company is hacked?

Malware Attack

Follow these steps immediately to limit the impact of a malware attack:

  1. Disconnect the infected systems, devices immediately from all network connections (wired, wireless or mobile).
  2. Reset credentials, especially privileged accounts.
  3. Securely wipe the infected devices and reinstall the operating system from gold build. In case of an incident you need investigating into, get professional help from third party security providers.
  4. Double check that the underlying system is clean before restoring backup.
  5. Now connect these devices to network to download, install and update the software installed.
  6. Install antivirus and run a full scan. Schedule periodic scans and on-access scanning capabilities.
  7. Monitor network traffic across the company to identify any similar behaviors.

Ransomware Attack

Ransomware attack encrypts the important files, leaving no way to decrypt these without decryption key. This is held by attackers available upon ransom payment. A good initiative No More Ransom , supported by Europol European Cybercrime Centre and private companies, provides prevention advice and decryption tools from anti-virus vendors, which may help.

Conclusion

Cybersecurity is a must-have for anyone who is heavily reliant on the internet for lifestyle, work, or leisure purposes. Too many attackers have made a foothold in the cybersphere, which means that staying safe must be everyone’s priority. Educating users on the importance of network security will help everyone fight back against malicious attackers online.

Our services assist customers with preparation against such attacks. These technical risk assessments assist with proactive and resilient measures against malicious attacks on your network and data. Should you feel to discuss any security concerns, call for a free chat or email [email protected] .

CONTACT US