Less than half of companies are prepared to face growing threat from hackers

hackers

The threat of financial losses from malware that encrypts computer users’ data, known as cryptolockers or ransomware, is growing, according to PwC experts. They emphasize that only half of companies surveyed by PwC have intrusion detection tools and actively monitor & analyse information security intelligence, while less than half of companies conduct vulnerability assessments, conduct threat assessments and use threat intelligence subscription services.

The hackers are constantly refining their tactics, identifying new ways to extract money from the businesses and individuals they target. Just a few years ago, the primary method was phishing attacks that infected the computers of online banking clients, who were enticed to download malware by clicking on links in e-mails. After the targets’ computers were infected, the attackers monitored users’ transactions, stealing their data to authorise fraudulent transactions, or by using social engineering techniques to trick unwitting clients into transferring money to the fraudsters’ accounts.

“Attackers today are increasingly using new methods to extract money, which are based on extortion. For several years we have observed growth in the threat from ransomware. After being installed on a computer, this software encrypts files and demands that the user pay a fee in exchange for decryption.” – Piotr Urban, the PwC partner who leads the firm’s Cyber Security team

If the fee isn’t paid, the user loses access to the data, or it is made public, exposing the user and their organisation to reputational risk.

In the case of large enterprises, user and production data is often backed up, so the data encrypted by ransomware can be recovered. But while this may appear to make enterprises resistant to this type of threat, that’s not always the case.

“Recovering data once it’s been encrypted by ransomware is only half the battle. The company’s reputation is also important, and it can be damaged if the stolen information is leaked, or if information about the incident is revealed. Additionally, the attackers may install other malware components allowing remote access to the infected it infrastructure, not to mention the costs of business interruption due to the infection, or the need to isolate systems to resolve the problem and reduce the threat.” – Tomasz Sawiak, deputy director of the Cyber Security team

How does the WannaCryptor (WannaCry) ransomware work?

The wave of infections by the WannaCry ransomware has been building since Friday 12 May. Many large international companies have been affected by the attack.

As in the majority of such cases, computers can be infected by e-mails encouraging users to open attachments, but this attack is distinguished by the self-propagation mechanism built into the malware, which makes it possible for the infection to spread itself from a single computer to others in its IT environment. The malware uses a known hole in Windows that was patched by Microsoft in its MS17-010 update in March. Unfortunately, software updates and patch installations take a lot of time in large IT environments, leaving many computers vulnerable. Additionally, computers with vulnerable Windows systems can be infected by connecting to public Wi-Fi networks where other computers are infected. The malware can update itself automatically, installing further versions that avoid standard detection methods in anti-virus systems.

The basic rule for this kind of case (if there is no threat to human life) is not to enter a dialogue with the attackers, and not to pay any ransom.

To limit the threat of infection and the operation of the WannaCry malware, it’s important to consider the following actions:

Immediate isolation of infected workstations from the remaining components of the enterprise’s IT infrastructure. Limiting the ability of infrastructure components to communicate with the Internet using the SMB protocol, used for transferring and sharing files (blocking public Internet communication to and from ports 137, 139 and 445).
Limiting the ability to use the SMBv1 version of the file-sharing protocol throughout the entire IT infrastructure. Limiting the ability to run unsigned macros in Microsoft Office documents by changing group policy settings, and allowing only approved, properly signed macros.

Ensuring that remote access to IT infrastructure takes place over a VPN, using Two Factor Authentication. Identifying and limiting access by infrastructure components (without the MS17-010 patch installed) to key applications and components of the enterprise’s IT infrastructure. Implementation of the MS17-010 patch on all vulnerable computers in the IT infrastructure.

Forced updates of antivirus signatures.

Ensuring the ability for workstations to resolve domain names and communicate with the “kill switch” domains used in the most popular version of the WannaCry malware.

Monitoring communication and unblocking resolution for the domains: iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com and ifferfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com).

Continuously educating and raising awareness among employees in the area of malware and attack vectors with social engineering elements.