{"id":2514,"date":"2020-06-08T13:20:21","date_gmt":"2020-06-08T05:20:21","guid":{"rendered":"https:\/\/greycortex.hk\/?p=2514"},"modified":"2020-06-08T13:23:04","modified_gmt":"2020-06-08T05:23:04","slug":"greycortex-ceo-on-how-to-minimize-the-risk-of-ransomware-attack","status":"publish","type":"post","link":"https:\/\/greycortex.hk\/zh\/2020\/06\/08\/greycortex-ceo-on-how-to-minimize-the-risk-of-ransomware-attack\/","title":{"rendered":"GREYCORTEX CEO ON HOW TO MINIMIZE THE RISK OF RANSOMWARE ATTACK"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"2514\" class=\"elementor elementor-2514\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96cad9b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96cad9b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5dd9f61\" data-id=\"5dd9f61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-640f8bf elementor-widget elementor-widget-text-editor\" data-id=\"640f8bf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3>13+1 PRINCIPLES FOR THE SECURITY OF YOUR NETWORK<\/h3><p><strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Ransomware\">Ransomware<\/a><\/strong>\u00a0\u2013 a term that we were already aware of a few years ago but most of us rather took it as a \u201cnot-our-problem\u201d kind of thing. However, cybercriminals didn\u2019t see it the same way and it was just a matter of time before that kind of extortionate vermin came to do harm in our land, too. And even though the attacks on\u00a0<strong><a href=\"https:\/\/www.radio.cz\/en\/section\/curraffrs\/cyber-attack-causes-major-disruptions-to-small-town-czech-hospital\">Bene\u0161ov Hospital\u00a0<\/a><\/strong>and\u00a0<strong><a href=\"https:\/\/www.radio.cz\/en\/section\/news\/okd-company-renews-mining-after-cyber-attack\">OKD<\/a><\/strong>\u00a0were not among the first ones, their coverage definitely raised awareness of the topic. Then, the emergence of coronavirus has actually created new opportunities of phishing and\u00a0<strong><a href=\"https:\/\/www.greycortex.com\/cs\/blog\/ransomware-uz-radeji-koronavirus-prvni-dil\">ransomware<\/a><\/strong>\u00a0campaigns for cybercriminals; hugely supported by the massive transition of office workers to home office.<\/p><p>There have been many confirmed cyber attacks just in Czechia in the past three months (the real number of organizations that fell victim to a cyber attack in Czechia is likely to be higher but not all the information gets published):\u00a0<strong><a href=\"https:\/\/rmx.news\/article\/article\/czech-president-s-office-hacked-data-leaked-abroad-for-months\">Prague Castle Administration<\/a><\/strong>,\u00a0<strong><a href=\"https:\/\/www.healthcareitnews.com\/news\/europe\/cyberattack-czech-hospital-forces-tech-shutdown-during-coronavirus-outbreak\">University Hospital Brno<\/a><\/strong>,\u00a0<strong><a href=\"https:\/\/www.irozhlas.cz\/zpravy-domov\/pocitace-nemocnice-psychiatrie-kosmonosy-kyberutok-nukib_2003301855_aur\">Psychiatric Hospital Kosmonosy<\/a><\/strong>,<strong><a href=\"https:\/\/zpravy.aktualne.cz\/domaci\/informacni-system-povodi-vltavy-napadli-hackeri\/r~fe9196b478d811eab115ac1f6b220ee8\/\">\u00a0Vltava River Basin Management<\/a><\/strong>\u00a0and\u00a0<strong><a href=\"https:\/\/prazsky.denik.cz\/zpravy_region\/virus-pocitac-kyberneticky-utok-hacker-praha-3-mail-urad.html\">Prague 3 City District Administration<\/a><\/strong>. Recently, having its branches in Czechia, the medical company\u00a0<strong><a href=\"https:\/\/krebsonsecurity.com\/2020\/05\/europes-largest-private-hospital-operator-fresenius-hit-by-ransomware\/\">Fresenius<\/a><\/strong>\u00a0has also been attacked.<\/p><p>Now that the topic of cybercriminals and the possibilities of protection against them gets more publicity, it could come in useful to refresh a few rules which may significantly minimize the risk of an attack on your infrastructure. I\u2019m going to try to summarize them in this article without getting too technical and complex so that anybody can understand. Hopefully, successfully \ud83d\ude42<\/p><p><img decoding=\"async\" data-recalc-dims=\"1\" class=\"alignnone size-medium wp-image-2517\" src=\"https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?resize=300%2C134&#038;ssl=1\" alt=\"\" width=\"300\" height=\"134\" srcset=\"https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?resize=300%2C134&amp;ssl=1 300w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?resize=1024%2C456&amp;ssl=1 1024w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?resize=768%2C342&amp;ssl=1 768w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?resize=1536%2C684&amp;ssl=1 1536w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/internet-1862312_1920_0.jpg?resize=600%2C267&amp;ssl=1 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p><p><strong>Rule number 1<\/strong><br \/>Don\u2019t try to find a single solution to the whole area of cyber security \u2013 there\u2019s nothing like a \u201cSilver Bullet\u201d or \u201cHoly Grail\u201d (i.e. a single \u201ccover-it-all\u201d or \u201csave-it-all\u201d) solution. Simply not. Just as in cars, with a lot of various features that increase the safety (the sole car construction ensures passive safety, then there are the safety belts, airbags, ABS and other electronic systems), it\u2019s their combination that will make you more likely to survive an accident, or get away without getting injured. The same applies to cyber security \u2013 it takes various \u201clayers\u201d of security and their correct combination to ensure the maximum degree of protection.<\/p><p><strong>Rule number 2<\/strong><br \/>Use up-to-date versions of operating systems and update them regularly \u2013 those \u201conce-in-a-blue-moon\u201d updates leave enough space for an attacker to use unpatched flaws to penetrate your infrastructure. If, for some serious reason, you really have to use operating systems after they expire (i.e. their developer doesn\u2019t issue updates anymore), at least reserve a separate segment in the network for such devices and take special care of them; however, it\u2019s definitely better not to have such devices in the infrastructure at all. Don\u2019t forget to regularly update any other software you use \u2013 as well as an out-of-date operating system this can also lead to the infection of your infrastructure.<\/p><p><strong>Rule number 3<\/strong><br \/>Use good-quality antivirus solution. Current antivirus software includes a lot of security mechanisms and their scope is rather vast so they will help you prevent plenty of problems. Nevertheless, the same rule as with operating systems applies here \u2013 update, update, update!<\/p><p><strong>Rule number 4<\/strong><br \/>Don\u2019t trust the \u201cexperts\u201d who claim that it\u2019s enough to use common sense, not to open suspicious attachments and to behave sensibly \u201con the web\u201d to prevent the infection \u2013 that\u2019s not true anymore. Modern malware can exploit unpatched flaws not only in operating systems, but also in applications, etc., and it can use them to get into your infrastructure without you performing an action knowingly (such as opening an email attachment).<\/p><p><strong>Rule number 5<\/strong><br \/>Even your firewall and network elements deserve your attention and regular updates. After all, firewall or routers are also computers, i.e. hardware, which run some specialized software. And as it\u2019s generally known and the experience has confirmed that there\u2019s a flaw in every kind of software, it\u2019s vital to update such devices regularly, too. If you don\u2019t do so, you open yet another route into your infrastructure for attackers, just as we showed in practice at our conference\u00a0<strong><a href=\"https:\/\/channelworld.cz\/novinky\/greycortex-usporadala-prvni-rocnik-konference-greycortex-day-23486\">GREYCORTEX DAY<\/a><\/strong>, where we demonstrated an attack on a typical network infrastructure live.<\/p><p><strong>Rule number 6<\/strong><br \/>Unless necessary, don\u2019t work within the administrator account. It\u2019s not really needed for regular work and if an attacker breaks through the security of the device you\u2019re logged on as an admin (most probably unnecessarily), you\u2019ll make their efforts much easier as well as their way to your data (and possibly money).<\/p><p><img decoding=\"async\" data-recalc-dims=\"1\" class=\"alignnone size-medium wp-image-2518\" src=\"https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?resize=300%2C158&#038;ssl=1\" alt=\"\" width=\"300\" height=\"158\" srcset=\"https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?resize=1024%2C538&amp;ssl=1 1024w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?resize=768%2C403&amp;ssl=1 768w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?resize=1536%2C806&amp;ssl=1 1536w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/ransomware-3998798_1920.jpg?resize=600%2C315&amp;ssl=1 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p><p><strong>Rule number 7<\/strong><br \/>If you use any kind of remote desktop at work, don\u2019t leave it on, nor permanently open to the Internet, as it\u2019s often the target of initial stages of an attack and you practically leave\u00a0<strong><a href=\"https:\/\/martinhaller.cz\/bezpecnost\/postrehy-z-bezpecnosti-jak-se-nechat-hacknout-rdp-serverem\/\">the door to your infrastructure<\/a><\/strong>\u00a0open. In general, be careful how your colleagues or suppliers working remotely connect and which permissions they have, which parts of the infrastructure they can access and how their connection to internal tools is secured. All this is linked to the following rule:<\/p><p><strong>Rule number 8<\/strong><br \/>Use VPN only (Virtual Private Network) for external connection to the internal network. If you allow direct connection from the outside without using VPN, sooner or later, some attacker will abuse it. Don\u2019t forget to cancel disused VPN accounts as there\u2019s always the danger of abuse of a long-forgotten access. This applies in general \u2013 if you grant anyone access to anywhere and they don\u2019t need it for work anymore, cancel it.<\/p><p><strong>Rule number 9<\/strong><br \/>Divide the visitor (i.e. publicly accessible) and internal \/ production parts of infrastructure thoroughly and consistently. This doesn\u2019t only apply on guest Wi-Fi, but any part of the infrastructure which can be freely accessed by unknown persons. A lot of attacks on internal infrastructure start by a \u201cvisit\u201d of an unwelcome guest from the publicly accessible part of the network.<\/p><p><strong>Rule number 10<\/strong><br \/>Cybercriminals keep improving and coming up with new ways how to convey harmful code to you and your colleagues, so it\u2019s useful to get informed regularly on new ways how someone might try to trick you (or make you do something that will spread the infection) and on new dangers. It\u2019s definitely not a waste of time or money to take part in an interesting conference on such a topic or get regular training from companies that focus on prevention. You\u2019d have to invest a lot more time and money in removing the consequences of actions of unknowing employees. Unfortunately, the human factor will always be the weakest link in the chain of cyber security, so it pays to regularly raise awareness of what may happen.<\/p><p><strong>Rule number 11<\/strong><br \/>If your colleagues work within your infrastructure on their own devices (so called BYOD, Bring Your Own Device), it\u2019s necessary to count on the\u00a0fact that you\u2019ll have to apply all the mentioned rules on such devices, which is rather a big problem. One of the possible solutions is granting these devices access only to a certain segment of the infrastructure, secure it properly and monitor, which may obviously be quite strenuous.<\/p><p><strong>Rule number 12<\/strong><br \/>If I don\u2019t understand something, I can\u2019t deal with it. If you don\u2019t have sufficient insight into the whole infrastructure and you don\u2019t have the possibility to monitor what\u2019s going on in it, the attacker is invisible to you and you\u2019re practically blind (until the attack shows in its full extent, i.e. in case of ransomware data encryption). That\u2019s why it\u2019s convenient to use the\u00a0<strong><a href=\"https:\/\/www.gartner.com\/en\/documents\/3902353\/market-guide-for-network-traffic-analysis\">NTA<\/a><\/strong>\u00a0solution (Network Traffic Analysis), such as our solution\u00a0<strong><a href=\"https:\/\/www.greycortex.com\/mendel\">GREYCORTEX MENDEL<\/a><\/strong>. These tools will not only allow you to see (to the tiniest detail) which devices there are in your network and what\u2019s going on in them, but they will also enable you to get timely notifications in case there\u2019s a suspicious and dishonest activity in the infrastructure thanks to the automatic analysis of the entire network performance and running event correlation (if you\u2019re interested in more information, you\u2019ll find it\u00a0<strong><a href=\"https:\/\/www.greycortex.com\/advanced-threat-detection\">here<\/a><\/strong>). Obviously, it\u2019s necessary to process such notifications and secure a remedy to the flaws found, but that\u2019s well beyond this article. If there isn\u2019t an internal department dealing with cyber security, you can get the SOC services (Security Operations Centre) at some of our\u00a0<strong><a href=\"https:\/\/www.greycortex.com\/partners\">partners<\/a><\/strong>\u00a0and leave this burden with them. You\u2019ll appreciate the NTA solution especially in case the attacker manages to\u00a0<strong><a href=\"https:\/\/martinhaller.cz\/bezpecnost\/muzete-se-na-svuj-antivirus-spolehnout\/\">disable your antivirus solution<\/a><\/strong>\u00a0or to get through your firewall (e.g. by hiding illegitimate, harmful traffic inside the legitimate traffic and thus trick the firewall), as they can\u2019t hide the signs of harmful behaviour from permanent analysis of network traffic. What\u2019s more \u2013 the NTA solution will help you with forensic analysis, i.e. subsequent investigation, of where the attack came from or how the infection got inside your infrastructure, which will help you detect and remove weak spots in security.<\/p><p>IN SHORT \u2013 WHAT ARE THE MAIN BENEFITS OF OUR NTA PRODUCT\u00a0<strong><a href=\"https:\/\/www.greycortex.com\/\">GREYCORTEX MENDEL<\/a><\/strong>\u00a0IN YOUR FIGHT WITH CYBER CRIMINALS?<\/p><ul><li>It\u2019s fully passive and it analyses the mirror of all your network traffic \u2013 it can basically monitor everything but at the same time it\u2019s invisible to cybercriminals, they don\u2019t know that you know about them and their activities.<\/li><li>It doesn\u2019t send any data \u201chome\u201d for analysis (manual analysis by an army of analysts), but analyses everything using machine learning and other advanced methods.<\/li><li>Unlike us, people, it works 24\/7\/365 (plus one extra day in leap years) and it never gets tired.<\/li><\/ul><p>You\u2019ll find practical demos how GREYCORTEX MENDEL\u00a0helps increase cyber security\u00a0<a href=\"https:\/\/www.greycortex.com\/capabilities\">here<\/a>.<\/p><p><strong>Rule number 13<\/strong><br \/>Back up, back up and back up again! Ideally, make backups on exchangeable media and take them physically away from your company\u2019s premises (you\u2019ll ensure continuity of work in case of fire, flood or mobilisation by doing so :), but mainly, you\u2019ll make sure that in case of ransomware attack the backups in the same infrastructure won\u2019t be encrypted. If, for some reason, it\u2019s not possible or convenient to take away backups physically, make sure the servers with back-up copies aren\u2019t connected to your infrastructure permanently and thus inaccessible to the attackers in time of an ongoing attack \u2013 otherwise they\u2019ll encrypt even these backups and there won\u2019t be anywhere to recover the data from.<\/p><p><strong>And finally, the last rule: Even following all the above-mentioned rules may not ensure 100 % protection against an attack of your infrastructure as present cybercriminals are no\u00a0<a href=\"https:\/\/martinhaller.cz\/ransomware\/hackeri-maji-novy-trik-naucili-se-s-ransomware-lepe-vydirat\/\">\u201cgreasy teenagers\u201d<\/a>\u00a0who want to prove themselves anymore, but professional groups with huge budgets and possibilities.<\/strong><\/p><p>But if you stick to all of the above-mentioned, you\u2019ll at least make their attempt to launch an attack immensely difficult, and because they know that the effort must be smaller than the possible profit (for their \u201cbusiness\u201d to make sense), it\u2019s highly probable they\u2019ll attack somebody else instead, someone who\u2019s an easier target not having followed the rules.<\/p><p><strong>Would you like to know how GREYCORTEX MENDEL can help you improve the level of your cyber security and win the war with cyber criminals?<\/strong><br \/>Look\u00a0<strong><a href=\"https:\/\/www.linkedin.com\/posts\/greycortex_mendel-closes-the-security-gap-activity-6663794929329938432-xS-0\/\">here<\/a><\/strong>\u00a0or contact me via\u00a0<strong><a href=\"https:\/\/www.linkedin.com\/in\/petrchaloupka\/\">LinkedIn<\/a><\/strong>\u00a0or email\u00a0<strong><a href=\"mailto:petr.chaloupka@greycortex.com\">petr.chaloupka@greycortex.com<\/a>.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0994e26 elementor-position-left elementor-vertical-align-top elementor-widget elementor-widget-image-box\" data-id=\"0994e26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/peca_v2_1.jpg?fit=200%2C200&amp;ssl=1\" class=\"attachment-full size-full wp-image-2519\" alt=\"\" srcset=\"https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/peca_v2_1.jpg?w=200&amp;ssl=1 200w, https:\/\/i0.wp.com\/greycortex.hk\/wp-content\/uploads\/2020\/06\/peca_v2_1.jpg?resize=150%2C150&amp;ssl=1 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">Petr Chaloupka<\/h3><p class=\"elementor-image-box-description\">CEO, GREYCORTEX<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>13+1 PRINCIPLES FOR THE SECURITY OF YOUR NETWORK Ransomware&nbsp;\u2013 a term that we were already aware of a few years ago but most of us rather took it as a \u201cnot-our-problem\u201d kind of thing. However, cybercriminals didn\u2019t see it the same way and it was just a matter of time before that kind of extortionate [&hellip;]<\/p>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","_crdt_document":"","advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8],"tags":[],"class_list":["post-2514","post","type-post","status-publish","format-standard","hentry","category-news"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/paZ0Rf-Ey","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/posts\/2514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/comments?post=2514"}],"version-history":[{"count":3,"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/posts\/2514\/revisions"}],"predecessor-version":[{"id":2521,"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/posts\/2514\/revisions\/2521"}],"wp:attachment":[{"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/media?parent=2514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/categories?post=2514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greycortex.hk\/zh\/wp-json\/wp\/v2\/tags?post=2514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}