Story image

Attackers will get in: Three frameworks that help you through ransomware

22 Nov 2017

Did you know the first ransomware hit computers in 1989? The PC Cyborg Trojan demanded a $189 ransom. The Trojan hid all folders and encrypted files on a PC’s C: Drive. If victims didn’t pay the ransom, the ransomware’s actions would not be reversed.

Fast-forward to 2017 and WannaCry and NotPetya were easily the most prevalent ransomware strains. NotPetya was probably the most notorious.  

All it needed to do was use all saved SMB credentials on a Windows system and use these to log on to other machines. This means it could spread – fast. It also offered no way to contact the attacker in the event that victims paid the ransom.

These attacks are reminders that the cyber threat landscape is sophisticated to the point in which we have to accept that attackers will get into our networks.

But are we prepared? To successfully defend our organisations, we need to prepare and understand the indicators of compromise.

LogRhythm’s free guide takes an in-depth look at the typical phases of a ransomware attack, including:

  • How ransomware attacks begin – it can take as few as 15 minutes
  • How ransomware attacks progress through endpoints and networks
  • NIST, SANS and Navy incident frameworks that help organisations handle ransomware attacks
  • What you can do to prevent or limit an infection, including a five-step guide from preparation to recovery

With good planning and a definitive course of action, an attack can have a minimal impact to our organisations.

Salesforce continues to stumble after critical outage
“To all of our Salesforce customers, please be aware that we are experiencing a major issue with our service and apologise for the impact it is having on you."
D-Link hooks up with Alexa and Assistant with new smart camera
The new camera is designed for outdoor use within a wireless smart home network.
Slack users urged to update to prevent security vulnerability
Businesses that use popular messaging platform Slack are being urged to update their Slack for Windows to version 3.4.0 immediately.
Secureworks Magic Quadrant Leader for Security Services
This is the 11th time Secureworks has been positioned as a Leader in the Gartner Magic Quadrant for Managed Security Services, Worldwide.
Google puts Huawei on the Android naughty list
Google has apparently suspended Huawei’s licence to use the full Android platform, according to media reports.
Using data science to improve threat prevention
With a large amount of good quality data and strong algorithms, companies can develop highly effective protective measures.
General staff don’t get tech jargon - expert says time to ditch it
There's a serious gap between IT pros and general staff, and this expert says it's on the people in IT to bridge it.
ZombieLoad: Another batch of flaws affect Intel chips
“This flaw can be weaponised in highly targeted attacks that would normally require system-wide privileges or a complete subversion of the operating system."