--> How to Keep Your Business Safe From the Ongoing Ransomware Threat | Top Tech Site
How to Keep Your Business Safe From the Ongoing Ransomware Threat

How to Keep Your Business Safe From the Ongoing Ransomware Threat


Is the Petya ransomware spreading? How do you safeguard IT resources against such attacks? originally appeared on Quora - the place to gain and share knowledge, empowering people to learn from others and better understand the world.

Answer by IBM Security's Wendi Whitmore, Global Partner & Lead, IBM X-Force Incident Response & Intelligence Services (IRIS) and Steve Stone, Global Lead-Intelligence Services, X-Force IRIS, on Quora:

"On June 27, 2017 organizations in over 65 countries reported they had been infected with Petya ransomware. Petya ransomware was first discovered in March 2016, and like most malware, it was primarily spread via email phishing attacks. After a user was infected, the ransomware would encrypt data files on the systems and hold them hostage in exchange for a ransom payment. Once the ransom was paid, the attackers would typically (but not always) provide the decryption key so that users could restore their files. This ransomware is still in the wild, and users can still fall victim.

Notably, however, the initial Petya ransomware is very different from the Petya variant that was released in June 2017. This new Petya variant is not truly ransomware. Instead, it's wiper malware disguised as ransomware. The wiper malware does not hold data hostage in exchange for a ransom; it's sole purpose is to destroy data and corrupt systems. There have been no new reports of this Petya variant following June 27, 2017, but this and similar types of malware can (and will likely) spread at some point in the future.

While you can't predict the next attack, you can take steps now to protect your IT resources from similar future attacks. Some of those steps include:

Train users to be suspicious. Don't open email attachments or click hyperlinks in emails that you're not expecting. If you don't know the sender, delete the email immediately. If you do know the sender but the message is unexpected or suspicious, verify via call or text that the email is legitimate. If it's not legitimate, delete it immediately.

Keep systems patched and up to date. Always apply the latest software patches and make sure antivirus signatures are up to date. In relation to this Petya variant, Microsoft patch MS 17-010 would have largely stopped the malware's ability to spread using Eternal Blue and Eternal Romance vulnerabilities. Regular patching significantly reduces the attack surface and makes it more difficult for the attacker to get in.

Block specific ports. Block SMB ports (particularly ports 139 and 445) from external hosts to reduce the attack surface. Also Block UDP ports 135, 137, 138 to prevent lateral movement within the network.

Disable PsExec and WMIC. PsExec and WMIC are legitimate administrative tools, but they're commonly used by attackers in a variety of attack types. In the case of this Petya variant, disabling these tools can help prevent the spread of this malware throughout the environment.

Backup data. Backup critical data on a regular basis, and make sure those backups are available offline. Be sure your backups are not always kept on the network; leaving them connected can expose them to encryption and destruction.

Segregate duties and isolate critical data. Segregate duties between user and administrative accounts, and make sure that no one account (including Domain Admin) can execute commands on all systems on the network. In addition, identify your critical data, and isolate and segment it from the rest of the network."

Any information IBM provides is not legal advice.

This question originally appeared on Quora - the place to gain and share knowledge, empowering people to learn from others and better understand the world. You can follow Quora on Twitter, Facebook, and Google+. More questions:
  1. Thanks for sharing such an interesting article, your points were informative. This blog is always loaded with useful information that has helped me grow my blogs. Thanks for more.Technology Write for Us

    Reply Delete

Designed by TopTechSite
Name

Android,57,Apple,48,Artificial Intelligence,4,Bing,2,BlackBerry,2,Blogger,7,Blogger Templates,7,Blogger Tips,2,Blogging,7,Business,47,Cameras,2,Cars,9,Computer,2,Computing,5,Culture,1,Domain,2,Downloads,1,Elon Musk,2,EMail,3,Facebook,32,Feature,3,Galaxy Note 20,2,Galaxy Note 4,1,Galaxy Note 7,3,Galaxy Note 8,7,Galaxy Note 9,1,Galaxy S11,1,Galaxy S20,2,Galaxy S8,5,Games,12,Gaming,2,Gmail,2,GoDaddy,1,Google,43,Health,7,Hosting,1,How to,23,Instagram,7,Intel,1,ios,1,iOs 11,1,iOs 13,1,iPad,3,iPhone,69,iPhone 14,2,iPhone 6,1,iPhone 7,1,iPhone 8,19,iPhone 9,1,iPhone X,12,Laptops,8,LG,7,LG V30,6,LinkedIn,2,Meta,1,Microsoft,14,Moto X4,3,Motorola,5,Nasa,5,News,368,Nokia,2,Nokia 8,1,OnePlus,2,OnePlus 3,1,OnePlus 3T,1,p,1,Phones,148,Real Estate,1,Samsung,38,Science,4,SEO,2,Social Media,44,Sony,3,Source: BetaNews,1,Space,12,Success,50,Tablet,1,Technology,344,TVs,1,Twitter,8,WhatsApp,2,WordPress,1,WordPress Themes,1,Xiaomi,4,Xperia,1,Yahoo,1,YouTube,7,
ltr
item
Top Tech Site: How to Keep Your Business Safe From the Ongoing Ransomware Threat
How to Keep Your Business Safe From the Ongoing Ransomware Threat
Is the Petya ransomware spreading? How do you safeguard IT resources against such attacks? originally appeared on Quora - the place to gain and share knowledge, empowering people to learn from others and better understand the world. Answer by IBM Security's Wendi Whitmore, Global Partner & Lead, IBM X-Force Incident Response & Intelligence Services (IRIS) and Steve Stone, Global Lead-Intelligence Services, X-Force IRIS, on Quora:
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMVbannhUuoz3WBPDiPGcZkRFs012jPauv4Bas1WBl5dhXllgMJ_TVM1MErGDAIgpOHlI2h0EuKKUkjaVcO7nseRRNncfsv1pC_CzI4mpjfNe_S2K0tQGL1_jw5R84xmOT_c0-Sus7xeA/s1600/how-to-keep-your-business-safe-from-ongoing-ransomware-threat.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMVbannhUuoz3WBPDiPGcZkRFs012jPauv4Bas1WBl5dhXllgMJ_TVM1MErGDAIgpOHlI2h0EuKKUkjaVcO7nseRRNncfsv1pC_CzI4mpjfNe_S2K0tQGL1_jw5R84xmOT_c0-Sus7xeA/s72-c/how-to-keep-your-business-safe-from-ongoing-ransomware-threat.jpg
Top Tech Site
https://toptechsite.blogspot.com/2017/09/how-to-keep-your-business-safe-from-ongoing-ransomware-threat.html
https://toptechsite.blogspot.com/
https://toptechsite.blogspot.com/
https://toptechsite.blogspot.com/2017/09/how-to-keep-your-business-safe-from-ongoing-ransomware-threat.html
true
7908177386937608306
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content