CryptoLocker and other variants of Ransomware are spreading like wildfire in the cyber security world. Ten years after it first appeared in Russia, four million samples of Ransomware were identified in the second quarter of 2015 alone.
Today the global variety and scope of Ransomware is exploding – moving away from advanced technical attacks towards criminal business models with a large funding base. Ransomware outfits now have budgets for marketing, ‘customer support’ and streamlined operational efficiency.
According to Security Magazine, Ransomware is beginning to target the Internet-Of-Things. Meanwhile Ransomware-as-a-Service has emerged for fraudsters and criminals looking to use stolen data as a threat.
Sounds scary and in many ways it is. The attackers are getting bolder and their attacks more sophisticated.
CryptoLocker is particularly interesting as it transgresses several security architecture ingress points. But you can prevent or mitigate the effects of a Ransomware attack with some simple changes to your IT Security posture.
There’s no silver bullet but with a little attention and tweaking, and a clear and thorough process, you can help protect your network, users, data and ultimately your company’s bottom line.
First, think like Cryptolocker.
CryptoLocker preys on the good-will of the unsuspecting victims, using little-known back doors that exist in almost every network. It uses unscrupulous tactics to tug at the emotions, tricking everyday people into inadvertently bypassing security controls.
Second, understand how cryptolocker attacks your system.
At InfoTrust we’ve mapped out the end-to-end CryptoLocker lifecycle against the Cyber Security Framework from the National Institute for Standards & Technology (NIST).
The life-cycle of a successful CryptoLocker attack goes something like this:
Securing your Cryptolocker readiness means reviewing and improving these nine cyber security capability dimensions.
Typically you need only make simple (and in many cases free) configuration changes to prevent or mitigate CryptoLocker. But where do you start?
As a first step, our team can perform an audit, which will provide an insight into potential weaknesses in your security posture that CryptoLocker could exploit. Contact us for more information.