Part 2: Creating your Ransomware Defence
Welcome back to part two in the blog series ‘Breaking the Ransomware Cycle’. In this section, we’ll be exploring how organisations can formulate a plan to limit the impact of Ransomware should it strike.
Case Study
Discover how ramsac is delivering CloudCover 365, Microsoft 365 Backup with DCS.
Read nowPart 3: Recovering and evolving from a Ransomware attack originally led by Kurt Kiefer, CRO of virtualDCS.
There will be many people reading this blog and they’re likely to fall into the following categories; firstly, those who have seen it all before, have experienced a Ransomware attack and know it’s only a matter of time before it happens again.
Secondly, there will be those who have only done basic training, with a textbook idea of what’s coming but have thankfully never experienced it themselves… yet.
Then finally, there are the Ransomware gurus - the people who have survived multiple attacks and know all the technology, the jargon, and the models. Hopefully, all will find this blog (and the original webinar) useful.
So, what happens should you receive the dreaded Ransomware alert? Well, it’s easier said than done, but the most important thing when following these steps is to remain calm.
How do you remember the above steps under pressure? The answer is to have your own, unique company playbook to hand, considering all the elements presented above, and in the second blog of the series. This plan needs to be physically printed or stored outside of your system on a device that can’t be compromised.
Areas you also need to document and consider within this plan include:
Communication: Your normal communications methods, such as Microsoft Teams may be taken offline during the attack, so who are you going to contact, and how?
Chain of command: Along with the above, you also need an agreed chain of command in place – who is leading the Ransomware response team, what roles and responsibilities need undertaking, and who will be on-call to help?
Testing and reviews: The plan needs to be under constant review, with regular rehearsals, and you need to have the confidence that your team can implement it.
Coordination with insurance: When involving third parties data recovery becomes more complicated. In some cases, it can take up to 24 hours for a dedicated Cyber insurance team to respond to a request and to understand what an organisation can or cannot do with its equipment. Action before the response could potentially void the insurance claim, so it’s important to consider this in your playbook and read the terms and conditions.
Coordination with law enforcement: Similarly, there have been many rumours and reports of law enforcement agencies taking away equipment for analysis and testing. Despite the research, we can’t personally confirm if this is accurate or not, but as a Ransomware recovery plan should consider every eventuality – this should also be one of them. In the UK, where appropriate it should be reported to the National Cyber Security Centre (NCSC), Action Fraud, Information Commissioners Office (ICO) and Office of Financial Sanctions Implementation (OFSI).
In the UK, where appropriate it should be reported to the National Cyber Security Centre (NCSC), Action Fraud, Information Commissioners Office (ICO) and Office of Financial Sanctions Implementation (OFSI).
Top tip - Case studies often provide invaluable information on how attacks develop, so a top tip is to engross yourself in the most recent attacks, and the successes and failures others have experienced.
Recovering data to its original location after a Ransomware attack is not recommended for several reasons:
Forensic Analysis: Before recovery, it’s important to analyse the attack vector and impact assess the full impact before restoring data.
Integrity: Recovered data might be corrupted or altered by the Ransomware, leading to potential data loss or further system issues.
Security: Restoring data to a compromised system without fully eradicating the threat vector could leave vulnerabilities open for future attacks.
Persistence: The original location may still be infected with Ransomware or other malware, which could immediately re-encrypt or damage the recovered data.
It’s important to consider that you may have synchronously replicated the Ransomware from production to backup, where it now lies in wait. In this case, restoring data from the backup directly to the production environment will also restore the Ransomware, re-infect the system and introduce a ‘Ransomware loop’.
One way around this is to recover your ‘local backup’ to a public cloud, but this will take a lot of time that you may not have. Recovering data to its original location may not be the optimal solution. Our suggestion would be to consider a ‘Clean Room’.
A Clean Room is an isolated environment that’s segmented from the infected network, and when used with a Veeam Cloud Connect Backup solution from virtualDCS, is available as part of the solution. During an event, it can be used short to mid-term until the production environment is ready.
It provides a clean environment for you to safely analyse, test and vet data before fully restoring it to the production environment – avoiding the Ransomware recovery loop.
Everyone has heard of the phrase, “Plan for the worst and hope for the best”, and this phrase, especially in the context of Ransomware is apt, but for me, another notable quote also springs to mind:
“Amateurs [musicians] practice until they can get it right; professionals practice until they can't get it wrong” - Harold Craxton, professor at the Royal Academy of Music.
Service providers, like virtualDCS, can be an experienced ‘helping hand’ in the event of a Ransomware attack - with access to comprehensive platforms for recovery, they are exposed to incidents daily, fully understanding the nuances of Ransomware.
So, if you have any questions, would like to know more about CloudCover Clean Rooms or would like to leverage our experience handling complex Ransomware attacks then feel free to contact the team at +44 3453 888 327 or email enquiries@virtualdcs.co.uk.
A more in-depth version of this blog is available as part of the on-demand webinar ‘Break the Ransomware Cycle’ here.
Welcome back to part two in the blog series ‘Breaking the Ransomware Cycle’. In this section, we’ll be exploring how organisations can formulate a plan to limit the impact of Ransomware should it strike.
According to Cyber Security Ventures, a new organisation will fall victim to ransomware every 14 seconds in 2019, and every 11 seconds by 2021. Damage costs this year alone are predicted to be £9.2bn...
Ransomware is now a common (and often recurring) threat to modern organisations, and regardless of size or sector, businesses are now being forced to move from an “if it happens” to a “when it happens”...
In case you haven’t already heard, Veeam has just announced a brand new feature that, when paired with virtualDCS, will give organisations a new layer of protection in the war against Ransomware.