Ransomware is clearly the scourge of 2016. Every week there is a new and notable enterprise-level outbreak of this insidious class of malware – crippling and extorting an ever widening array of organizations.
For a threat that is overwhelmingly not targeted, it seems to be hitting large and small businesses with great success.
The malware infection can come through the front door of a failed “defense-in-depth” strategy or the side door of a mobile device latched to the corporate network on a Monday morning.
Regardless, many security teams and network administrators are scurrying to halt the rapid encryption of documents accessible through networked shares.
There are several new technologies available to organizations to detect the presence of ransomware within the network and alert security staff to an outbreak (which is just one example of the things the Vectra product does). But it is often a considerably more difficult task to automatically halt an outbreak mid-stream.
I’m often asked what is the “best” way of mitigating this threat – i.e. how can an organization stop ransomware from shutting down their business in the cheapest and most robust way?
The quickest “no-frills” way of mitigating the network encryption piece of ransomware is actually pretty simple and follows the canary-in-a-coal-mine principle.
Ransomware attempts to enumerate and encrypt files over network shares within the enterprise. A simple protection method is to ensure that every computer has a couple of monitored mounted shares.
If a user or computer attempts to write to or delete a file on those shares, the victim user’s access credentials are immediately suspended. And if the organization is using some form of network access control (NAC), the host computer is similarly and immediately disconnected from the network.
Since the current generation of ransomware tends to sequentially step through mounted shares in alphabetical or reverse-alphabetical order, ensuring that the first and last mounted shares – such as A: or D: drive, and Z: or Y: drive – are monitored canary shares is likely good enough.
Ensuring that the canary shares have a large number of disposable files can be useful too, as the ransomware will take time to cycle through encrypting these files. This provides a period of time in which credential and network access revocation information can be propagated to the rest of the network.
This technique is similar to what I’ve used in the past to deal with spam-sending malware and automated credential brute-forcing attacks. By adding user accounts that appear as the first and last positions in a user directory – such as Active Directory and email contacts – and monitoring any use of those names, it is possible to rapidly and automatically detect and mitigate the threat.
For example, if anyone attempts to email the fictitious first name in the address book, the mail server automatically blocks all email send requests from the user until the IT team has investigated.
The use of ransomware canary file shares, like canary accounts in Active Directory and email, can be a cheap and effective mitigation approach to threats. Sometimes the simplest methods can be the most effective.
Vectra® is the world leader in AI-powered network detection and response.