How to Deal with a Ransomware Attack: 5 Key Steps to Consider

Cyber2_1440x470

Cybersecurity Ventures predicts ransomware will attack a business, consumer, or device every two seconds and will cost victims $265 billion USD annually by 2031.

How to avoid being a victim of such an intrusion?

When it comes to ransomware, it’s important to say that the ransom is only the last part of a much more devastating attack. The median dwell time was particularly low for ransomware attacks, falling from nine days in 2022 to five days in H1 2023, harvesting credentials, installing malware, stealing your data, and corrupting your backups.

Once the attack is set and ready to launch, they start encrypting your data and asking you to pay that sizeable ransom payment, this is the point where most organizations realize they have been hit with a ransomware attack. payments in the global survey handed over between $1m and $5m, with high-earning firms the most likely to fork out. The average payout by companies with revenues of more than $5bn a year was just under $2.5m.

$5,130,000 USD is the average cost of a data breach in Canada

Average impact of a data breach on organizations with fewer than 500 employees is $3.31 million; the average cost per breached record is $164.

How Am I being attacked?

Nowadays, it has become easier more than ever to become a cyber-criminal. Ransomware kits can be bought on the Dark Web for less than $200. With these kits, cyber-criminals are leveraging fileless attacks that totally bypass all traditional antivirus and email protection systems.

Also, make no mistake, with many organizations now prioritizing employees working from home, more and more workers are now being hit with phishing emails, thus facilitating the access to the back end of a business, with 41% of incidents starting from a phishing email. Furthermore, contrary to popular beliefs, no single operating system is safer than another: Windows, MacOS, Android and iOS are all being hit. 

But paying the ransom is no guarantee that you will get your data back or prevent any other theft. Actually, your data is usually already up for sale on the Dark Web before they even ask you for the payment. Trying to recover without paying is never as simple as restoring from backups, even if they have not compromised them. You will need to treat your network and systems like scorched earth and reset all passwords and credentials.

How can you mitigate the loss of your data?

Once an attack occurs, it happens very fast. Many are surprised their antivirus system did not catch anything early on. Some try unplugging their systems hoping the attack will go away, but in all cases, they all wished they had seen it coming!

Here are my 5 key steps that you need to address now to give you much more than a fighting chance:

  1. Knowing that ransomware usually starts with a phishing email, let’s start there. User Awareness Training that includes Phishing Simulation to trains users to recognize and report suspicious emails is a relatively inexpensive way to strengthen your largest attack surface.
  2. You can further enhance your mitigation above by applying a Secure Email solution to intercept any content-based attacks in email, cloud storage, CRM apps, and messaging platforms. This will dramatically reduce the number of malicious emails that reach your users inboxes. Bonus points here if it includes a Security Operations Center (SoC) to send all those user-reported suspicious emails to.
  3. An XDR or Extended Detection and Response is a must for any organization wishing to have a system in place to limit cyber-attacks. This program provides your organization with multiple layers of protection to stop ransomware attacks before they get anywhere near the last phase of the attack: compromising your backups and encrypting your data. You can prevent ransomware if you monitor your files, networks, and endpoints to mitigate and remediate automatically 24/7, 365 days a year, by detecting and stopping any suspicious behaviour in real time. 
  4. Now that your files, networks, and endpoints are under control, you can take a closer look at your backup and restore plan. There are varying opinions on the best approach but thinking of the worst-case scenario is a good place to start. Your Recovery Point and Recovery Time Objectives need to be clearly defined. Now you can stage your backups with snapshots and or leverage cloud-based solutions to do the same. You should always have a fully offline version that you can turn to as a last resort. Practice your recovery regularly to ensure your plan works.
  5. Create and document your Cybersecurity Plan. This is now mandatory for all organizations of any size. Insurance companies are basing your cybersecurity insurance premiums on how well you are protected. They will ask you to fill in a questionnaire and will determine their risk of payout on your answers. Those organizations with the best documented plans will pay the lowest premiums and have access to the largest payouts, if required. Your plan should also provide your team with a step-by-step guide on what to do in case something does happen. It should clearly outline what steps to take and who to call. Do table-top exercises regularly to practice and turn it into a reflex.

By adopting this defense in layers approach with several mitigations at each layer, you will have more opportunities to detect and stop ransomware and any other type of malware or attack before it can infect your systems, exfiltrate your credentials and sensitive data, and finally overwrite or delete your files.

Partagez avec vos contacts