Big Companies Are Not Immune to Ransomware

985

According to Bleeping Computer, maze ransomware has hit a very large IT services company.

In the past, this malware gained entry using different techniques: exploit kits via drive-by downloads, remote desktop connections (RDP) with weak passwords, email impersonation, and email spam.Ā  In the majority of cases where the phishing email is being delivered, the user is clicking on the link, then they give the macro authorization to run, and ultimately get the malicious file installed.Ā  Once installed, the maze ransomware begins to encrypt critical data on the infected machine.Ā  While the encryption process is running, the ransomware also ex-filtrates the data to a server on the internet.Ā  When both of those processes are complete, the user is presented with a ransom demand and a method to recover their encrypted data.

In 2011, Lockheed Martin was credited with the idea of a cyber security kill-chain.Ā  The cyber security kill-chain, as designed, organizes threats into categories as well as security controls that can be deployed in those categories to mitigate those risks.Ā  If we apply the kill-chain to the Maze ransomware, we see the following:

  1. The phishing email, in the delivery category, should have been caught by commercial email protection tools.
  2. The malware files (kepstl32.dll, memes.tmp, and maze.dll), in the delivery category, should have been caught by malware tools as well as other AV tools. Note, the end user in this case had to allow the macros to run.Ā  User awareness is still essential to defending against these types of attacks!
  3. Once the macros have been enabled, the malware reaches out to a file server and downloads additional malware. Ā This should have been detected in the command and control as well as the delivery category.Ā  These categories are usually defended by threat intel tools, malware tools, and host-based tools.
  4. New files get created and the file encryption process begins. This file creation and subsequent encryption should be caught in the actions and exfiltration category and protected by tools such as threat intel, process anomaly detection, firewalls and malware tools.

Whatā€™s was not accounted for in the cyber kill-chain was the advance of machine learning and AI.Ā  Applying these tools to the data at each category of the kill-chain improves our ability to catch the anomalous behavior in each category, as well as improving the mitigation in each category by correlating the detections.

Stellar Cyber is committed to utilizing our Open XDR Platform to detect, alert, and respond to these types of behaviors.Ā  Our pervasive data collection, coupled with advanced data handling and machine learning, gives us multiple areas where we can detect these types of attacks across the cyber kill-chain.Ā  If the attack is missed in one stage of the kill chain, we will catch it in another stage. Ā Once detected, we have the ability to take automated action against those anomalous behaviors.Ā Ā Applying our technology to the Maze ransomware, we would potentially detect and mitigate it in the following ways:

  1. Our phishing detection would evaluate the malicious URL and mitigate its risk.
  2. RDP connections would be evaluated, alerted, and automatically mitigated when anomalous logins occur.
  3. The malware files referenced above would have been evaluated by our malware tool and mitigated.
  4. Had those files passed the malware test, the server sensor would have caught the behavior change (i.e. new process spawned with a new connection to the internet file server).
  5. If the dropper file passed the malware and server sensor assessment, the call to the internet file server could have been mitigated at the network level. The Stellar Cyber platform would have signaled the network firewalls to implement a block to the target server.
  6. The new file downloads could have been caught and mitigated at the server sensor or malware assessment.
  7. The encryption process would be detected by the server sensor and mitigation techniques applied to prevent/stop the process from continuing.
  8. Finally, the exfiltration process would be detected by the network layer, the host sensor, and the threat intel.

Ransomware is a huge industry.Ā  Backups and patching are essential but so is defense-in-depth.Ā  If you are not protecting your environment at the various stages of the kill-chain, you should consider doing so.Ā  If you are struggling to implement these concepts because you have too many tools that donā€™t interoperate, give us a call.Ā  We can help!

Ad

No posts to display