Some thoughts on ransomware stemming from a discussion this morning: Key Levers of a Ransomware Attack Ransomware attacks rely on two main factors: the speed to encrypt data and the speed of propagation. 1. Speed to Encrypt: Once attackers gain network access, their goal is rapid encryption. Splunk research shows encrypting 100 GB can take under five minutes, leaving little time for defenders to respond. This speed necessitates real-time detection and fast response mechanisms (see: https://lnkd.in/gGBKejGD). 2. Speed of Propagation: Beyond a single machine, ransomware’s effectiveness depends on how quickly it spreads across networks. Rapid propagation compromises multiple systems swiftly, complicating recovery. Attackers use vulnerabilities, weak credentials, and lateral movement to spread fast. Impact of Ransomware Ransomware’s impact extends beyond data encryption, affecting: 1. "Crown Jewels" Data: Ransomware threatens critical data—intellectual property, customer information, or strategic assets—whose compromise could lead to severe business or reputational damage. Protecting these assets is vital. 2. Critical Business Systems: Ransomware can disrupt essential systems like Oracle, SAP, and mainframes. Even with disaster recovery, restoring operations can be time-consuming and costly. Regularly tested recovery systems help mitigate this risk. 3. Worker Productivity: Ransomware disrupts productivity by encrypting end-user devices, halting daily operations. Fast propagation worsens this, as seen in incidents affecting school districts where productivity comes to a standstill. 4. Critical Workflows: Ransomware can force automated processes to revert to manual operations, which are slower and error-prone. This is particularly concerning in healthcare, where disrupted systems can risk patient safety, such as when hospitals switch to manual blood bank workflows, causing ER shutdowns. Mitigation Strategies Given these factors, organizations need a multi-layered approach to mitigate ransomware: 1. Immediate Response: Rapid detection and response are critical, as organizations may only have minutes or hours to intervene. Continuous monitoring, automated alerts, and prepared response teams are essential. 2. Manual Process Readiness: Regular drills to switch to manual processes can help maintain operations during disruptions. These exercises identify weaknesses and train staff to handle critical workflows when systems are down. 3. Protecting Crown Jewels: Organizations must identify and consolidate critical data in secure, restricted repositories. Implementing append-only backups ensures data restoration to a safe state. Creating specific threat models for crown jewels can drive security-by-design, helping prioritize SOC detection and response based on business impact. #infosec #ransomware #cybersecurity Horizon3.ai
Understanding Ransomware Risks for Small Businesses
Explore top LinkedIn content from expert professionals.
Summary
Ransomware is a type of cyberattack where malicious software locks businesses out of their own data until a ransom is paid. For small businesses, understanding ransomware risks is crucial, as they are often targeted due to limited cybersecurity measures.
- Strengthen your defenses: Use strong, unique passwords and enable multi-factor authentication to make it harder for attackers to gain access to your systems.
- Train your team: Educate employees to recognize and report phishing attempts, which are a common entry point for ransomware attacks.
- Regularly back up data: Create secure, offline backups of critical data to ensure you can recover quickly in case of an attack.
-
-
🚨 New Cybersecurity Advisory: #StopRansomware: Black Basta 🚨 I highly recommend checking out the latest Cybersecurity Advisory, which was co-authored by CISA, the FBI, HHS, and MS-ISAC. This detailed report on the Black Basta ransomware variant provides critical insights for network defenders. Over the last two years, the Black Basta Ransomware-as-a-Service (RaaS) operation has targeted over 500 private industry and critical infrastructure entities in North America, Europe, and Australia. Here are some key takeaways: 🔹 Proactive Measures: Implement phishing-resistant multi-factor authentication (MFA) and ensure your systems are updated with the latest patches to mitigate vulnerabilities. 🔹 Awareness Training: Regularly train users to recognize and report phishing attempts. User vigilance is crucial in preventing initial access by threat actors. 🔹 Advanced Threat Detection: Utilize continuous monitoring and leverage threat intelligence to swiftly detect and respond to potential compromises. 🔹 Lateral Movement Tools: Be aware that Black Basta affiliates use tools like BITSAdmin and Cobalt Strike for lateral movement. Ensure proper network segmentation and Implement controls to detect and block these tools. 🔹 Backup and Recovery: Maintain regular backups of critical systems and configurations to ensure quick recovery in the event of an attack. Stay informed and prepared to defend against ransomware threats. Build a Zero Trust Architecture to protect systems against such attacks. Read the full advisory for more detailed recommendations and action steps at CISA's website: https://lnkd.in/eGbsGksM #cybersecurity #Ransomware #ZeroTrust #networksecurity #technology
-
Today, we launched the 2025 Verizon Business Data Breach Investigations Report (DBIR). Here are some key takeaways specifically for the SMB community: - Ransomware's Grip on SMBs: A staggering 88% of breaches in SMBs involve ransomware, compared to 39% in larger enterprises. This highlights the urgent need for SMBs to prioritize ransomware protection. - Stolen Credentials Remain a Top Threat: The use of stolen credentials remains a primary hacking method for both large organizations and SMBs, emphasizing the importance of strong password policies and multi-factor authentication. - Vulnerability Exploitation is Surging: Exploitation of vulnerabilities has seen a 34% increase overall, with a focus on zero-day exploits. SMBs must ensure timely patching and robust vulnerability management. - Third-Party Risks Double: The involvement of third parties in breaches has doubled, underscoring the need for SMBs to carefully vet their supply chain and partner ecosystems. SMBs, in particular, need to strengthen their cybersecurity posture. Investing in security measures, employee training, and proactive threat mitigation is no longer optional—it's essential. To learn more about the DBIR, click here: https://lnkd.in/eXSbWS64 #Cybersecurity #DataBreach #SMBs #DBIR #Ransomware #SecurityAwareness #VerizonBusiness #SMBCybersecurity Verizon Erika Angell | John Constantino | Dave Takisaki | Chris Shank | Mark Tina | Michael Caralis