• Why IRONSCALES
  • Platform
    Spring '24 Software Release! Check out our new deep image-based detection, GWS capabilities, and more. Explore the new additions
  • Solutions
  • Learn
    New Report! Osterman Research releases their 2024 findings on Image-based/QR Code Attacks. Read the report
  • Partner
  • Pricing

Prevent Ransomware Attacks

Identify and respond to malware and URL threats, at scale.

Ransomware is a major threat to every business. Every single day, organizations around the world are having to pause operations due to inaccessible encrypted files, and they have to decide whether they let the attackers win and pay a large ransom to resume their work. However, as common as these attacks are, many businesses do not have a plan in place to prevent them.

What is Ransomware?

hex1
Ransomware is a type of malware that encrypts files on a device and demands some form of payment from the victim (almost always in cryptocurrency) in order to decrypt and release the hostage files. Like many other forms of malware, ransomware is often introduced as the payload of a phishing campaign, where the attacker tries to get unsuspecting victims to download a file in the form of an email attachment or on a malicious website.
Ransomware is particularly pernicious due to the fact that encrypted files typically cannot be decrypted without the attacker’s private encryption key. Even if a victim is able to remove the malware from her device, she will still be unable to access her files without the attacker decrypting them.
hex2

In addition to the cost of the ransom, businesses incur large additional operational expenses. In fact, it’s estimated that it costs over $84,000 for organizations to recover from a single attack.

Therefore, it’s important to attack ransomware at the source before it lands in the inbox or to get it out of email mailboxes before it can detonate.

Breaking Down a Ransomware Attack

A ransomware attack can be broken into four major components:

Target

Computer
POS Terminal
Phone
Wearable Device


box_icon1

 

Goal

Secure a payment from the victim in return for decrypting the hostage files

Payment often demanded in the form of cryptocurrencies such as bitcoin, as they are effectively non-reversible and difficult for law enforcement to track.

Dissemination Method

Install application
Download file from email
Click link
Visit webpage


box_icon2

 

Impact

Program targets some set of files and encrypts them using the private encryption key of the attacker


box_icon3

 

How Does a Ransomware Attack Work

Before implementing a system to prevent these ransomware attacks, it’s important to understand how the different parts of the attack work:

glow_icon_1 glow_icon_1

Target

Target

Victim downloads the file

For example, a user may download a file attachment from what seems to be a known source such as a business partner or friend

Victim downloads the file

For example, a user may download a file attachment from what seems to be a known source such as a business partner or friend

glow_icon_2 glow_icon_2

Execution and Encryption

Execution and Encryption

Program begins executing

The ransomware detects the files it wants to attack

Files are encrypted using the attacker’s remote private encryption key

Program begins executing

The ransomware detects the files it wants to attack

Files are encrypted using the attacker’s remote private encryption key

glow_icon_3 glow_icon_3

Ransom Demanded

Ransom Demanded

User is prompted with a message about the attack, letting them know that their files are encrypted and they’ll need to pay to get them decrypted

The attacker provides a method of payment such as a bitcoin address

User is prompted with a message about the attack, letting them know that their files are encrypted and they’ll need to pay to get them decrypted

The attacker provides a method of payment such as a bitcoin address

glow_icon_4 glow_icon_4

User Response

User Response

User decides whether or not they want to pay the ransom

If the payment is not made, the files will remain encrypted

The user can potentially remove the malware with antivirus software, but this will not decrypt the files

User decides whether or not they want to pay the ransom

If the payment is not made, the files will remain encrypted

The user can potentially remove the malware with antivirus software, but this will not decrypt the files

glow_icon_5 glow_icon_5

Resolution

Resolution

If the user paid the attacker, the attacker will likely—but not guaranteed—decrypt the files and move on

If the user paid the attacker, the attacker will likely—but not guaranteed—decrypt the files and move on

Types of Ransomware Attacks

There are three major subtypes of ransomware:

illu1

Scareware

Scareware is a type of malware where the attacker tries to scare or threaten the victim into performing some action. When used within a ransomware attack, scareware will involve aggressive language about what will happen to the encrypted files if the victim does not pay in a short window of time. The attacker may even pretend to be another organization such as a Federal agency demanding payment for a fine.

Crypto Ransomware

Crypto ransomware is when the ransomware attack demands payment in a cryptocurrency such as bitcoin. Unlike a traditional payment using a credit card or ACH network, a bitcoin payment cannot be reversed so the attacker can be confident that they’ll keep the payment after they decrypt the files. Furthermore, attackers can create numerous different bitcoin wallet addresses so that law enforcement cannot easily track their attacks or determine the true identity of the attacker.
illu2
illu3

Locker Ransomware

Locker ransomware is when the victim is locked out of their device completely rather than simply having files encrypted. In addition to being unable to access their files, this limits victims’ abilities to run anti-virus software to remove the malicious software from the device. This effectively makes the device unusable until the ransom payment is made.

Examples of Ransomware in the Real World

Now that we have a good understanding of how ransomware works and the different types, let’s look at a few real-world examples of major attacks:

CryptoLocker, 2013

CryptoLocker was an email based ransomware attack that sent infected email attachments through a large Russian botnet. It was targeted at Windows users and encrypted numerous types of files when activated. The program demanded either bitcoin or pre-paid cash vouchers before a deadline when the private key used to initiate the attack would be deleted.

Fortunately, a security firm eventually was able to obtain a database of many of the private keys, but the attackers were still able to collect around $3m dollars from businesses and users around the world.


WannaCry was a sophisticated ransomware attack that exploited a network vulnerability in older Windows operating systems that allowed it to propagate itself across computers in a network automatically.

The program demanded between $300-600 USD in bitcoin to be paid to the attackers. Due to the automatic propagation technique, it was able to spread to over 300,000 computers in only four days. It’s estimated that the economic toll may have been up to $4 billion in the form of ransom payments, business losses, and operational expenses.

WannaCry, 2017

How To Prevent Ransomware

To prevent a ransomware attack, you must understand where the current threats and attack vectors lie within your organization, implement advanced software systems to detect and remove them, and develop a sophisticated incident response program to help resolve ongoing attacks and make plans to prevent future ones.

blue_icon1

Assess Preparation For Potential Threats

Organizations must understand where their current vulnerabilities are and what types of attack vectors exist. Since ransomware typically comes from phishing attacks, it’s particularly vital to gauge the strength of your email email security stack as well as the savvy of your employees.

Phishing simulations can help proactively detect weaknesses in employee understanding of attack types. 

blue_icon2

Defend Against Future Attacks

Organizations must have a Security Operations (SecOps) team in place that is able to quickly triage, investigate, and respond to potential phishing attacks in real time. Further, they must have automated incident response systems in place so that resolution can be done quickly and without anything slipping through the cracks.

asset-471

Implement Advanced Protection Tools

In an evolving phishing, malware, and ransomware landscape, you need real-time tools that analyze and remove the most advanced threats instantly.

Traditional protection tools often fail against modern attacks. Firewalls, URL filters, and anti-spam software certainly have a place, but they will not protect you, your employees, and your company from today’s sophisticated attacks.

Advanced malware and URL protection and visual learning tools are some examples of technologies that can be deployed to help detect and prevent evolving threats much faster than manual analysis and keep organizations ahead of the attacks.

Combat Ransomware with IRONSCALES

The IRONSCALES platform leverages advanced malware and URL protection, computer vision and neural network technology to detect and respond to ransomware in real-time.

Unlike traditional ransomware and malware threat protection software, IRONSCALES offers native API integration with no MX record changes required, real-time and continuous inspection of suspicious URLs and attachments in the inbox, and best-of-breed anti malware and AV engines. Our advanced email ransomware protection tools keep your employees and your company safe. Request a demo of IRONSCALES to see how you can keep your company safe from ransomware.

ironscales_logo_blue

Gartner-Peer-Insights

View Ratings

 

 

"The Buck Stops Here. Best Email Security Solution On The Market"

Product Manager & Cyber Security Leader
IT Security & Risk Man
agement Company

Read Full Review >

Gartner-Customer-First