{"id":15540,"date":"2024-04-10T10:35:50","date_gmt":"2024-04-10T03:35:50","guid":{"rendered":"https:\/\/fpt-is.com\/en\/?post_type=goc_nhin_so&#038;p=15540"},"modified":"2024-07-17T14:33:08","modified_gmt":"2024-07-17T07:33:08","slug":"the-war-against-ransomware-attack-to-stay-safe","status":"publish","type":"goc_nhin_so","link":"https:\/\/fpt-is.com\/en\/insights\/the-war-against-ransomware-attack-to-stay-safe\/","title":{"rendered":"The war against ransomware: Attack to stay safe"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Ransomware is a type of malware that encrypts a victim&#8217;s data, rendering them inaccessible until the ransomware demand is paid. Attackers often use social engineering tactics, such as phishing emails, and exploitable system vulnerabilities to find a way into the victim\u2019s environment.<\/span><\/p>\n<h2><b>Understand the risks<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The most common types of ransomware include:<\/span><\/p>\n<p><b><i>Crypto Ransomware\/Encryptors<\/i><\/b><\/p>\n<p><span style=\"font-weight: 400\">This is one of the most popular and damaging variants. This type encrypts files and data in the system, making them inaccessible, and providing no decryption key.<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-medium wp-image-17852 aligncenter\" src=\"https:\/\/cdn.fpt-is.com\/vi\/R1-700x443.png\" alt=\"R1\" width=\"700\" height=\"443\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 10pt\"><i><span style=\"font-weight: 400\">How Crypto Ransomware Works<\/span><\/i><\/span><\/p>\n<p><b><i>Lockers:<\/i><\/b>Completely isolate (lock) you out of the system, rendering files and applications inaccessible. A lock screen will display a ransom demand, possibly accompanied by a countdown timer to increase urgency and urge victims to take action.<\/p>\n<p><img decoding=\"async\" class=\"size-medium wp-image-17851 aligncenter\" src=\"https:\/\/cdn.fpt-is.com\/vi\/R2-700x272.png\" alt=\"R2\" width=\"700\" height=\"272\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 10pt\"><i><span style=\"font-weight: 400\">How Locker Works<\/span><\/i><\/span><\/p>\n<p><b><i>Scareware:<\/i><\/b>Fake software that claims to have detected a virus or other problems on the victim&#8217;s computer and tricks them into paying a fee to resolve the problem. Some types of scareware lock the computer, while others simply fill the screen with pop-up warnings without causing actual harm to files.<\/p>\n<p><img decoding=\"async\" class=\"size-full wp-image-17850 aligncenter\" src=\"https:\/\/cdn.fpt-is.com\/vi\/R3.png\" alt=\"R3\" width=\"468\" height=\"443\" \/><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: 10pt\"><i><span style=\"font-weight: 400\">An example of Scareware<\/span><\/i><\/span><\/p>\n<p><b><i>Doxware\/Leakware:<\/i><\/b>A variant of ransomware designed to look like police, claiming that an illegal online activity has been discovered by the law enforcement agency, but can be resolved by paying a fine.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-medium wp-image-17849\" src=\"https:\/\/cdn.fpt-is.com\/vi\/R4-700x384.jpg\" alt=\"R4\" width=\"700\" height=\"384\" \/><\/p>\n<p><b><i>Ransomware as a Service (RaaS):<\/i><\/b>Refers to malware hosted anonymously by a \u201cprofessional\u201d hacker who handles all aspects of the attack, from ransomware distribution to payment collection and access restoration, in return for a portion of the large sum received.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-medium wp-image-17848\" src=\"https:\/\/cdn.fpt-is.com\/vi\/R5-700x343.png\" alt=\"R5\" width=\"700\" height=\"343\" \/><\/p>\n<h2><b>Ransomware attach vectors<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Ransomware can gain access to a victim\u2019s systems in a number of different ways. These pathways exploit vulnerabilities or intrusion techniques to launch attacks: Below are some common attack vectors:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Phishing<\/b><\/li>\n<li style=\"font-weight: 400\"><b>Malicious websites<\/b><\/li>\n<li style=\"font-weight: 400\"><b>Malicious attachments<\/b><\/li>\n<li style=\"font-weight: 400\"><b>RDP (Remote Desktop Protocol) attacks<\/b><\/li>\n<li style=\"font-weight: 400\"><b>Use of software with security vulnerabilities<\/b><\/li>\n<li style=\"font-weight: 400\"><b>USB and portable storage devices<\/b><\/li>\n<\/ul>\n<h2><b>How to protect against ransomware threat vectors<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Implementing robust cybersecurity measures is crucial for organizations to mitigate the risks posed by ransomware attack vectors. By adopting best practices and preventive measures, businesses can significantly reduce their attack surface and fortify their defenses against potential ransomware threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Here are some of the best ways to mitigate ransomware threat vectors:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Anti-phishing protection and email security<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Password security and management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Software updates and patching<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security awareness training<\/span><\/li>\n<\/ul>\n<h2><b>Attack to defend<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Handling and recovery from ransomware attacks can be extremely challenging and costly. Attackers tend to demand additional ransom in most ransomware attacks instead of walking away with the initial \u201cagreed\u201d amount. Therefore, robust ransomware defense must be a top priority for any company or individual. To build the most optimal defense plans, two major things need to be taken into account: Understand your systems and know your attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To gain insight into the systems, organizations need to perform periodic checks and in-depth analysis of network structures, systems, and applications to identify weaknesses and security vulnerabilities, and accordingly taking necessary measures to protect the systems from potential threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Acquiring knowledge about attackers is equally important. This helps organizations better understand how these hackers operate, their goals, as well as their attack methods. By familiarizing themselves with potential cyberthreats from hackers, organizations can develop more accurate and effective defense plans.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-17847\" src=\"https:\/\/cdn.fpt-is.com\/vi\/R6.png\" alt=\"R6\" width=\"468\" height=\"246\" \/><\/p>\n<p><span style=\"font-weight: 400\">To cover both of the above aspects, Penetration Testing could be an option. A penetration test (pen test) is a simulated real-world attack performed on a computer system to evaluate its security. Through regular pentests, organizations can detect and remediate security vulnerabilities before they are exploited by attackers. This helps strengthen systems and increase defenses against ransomware attacks and other cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The goal of a penetration test is to attempt to get into the systems and discover systems\u2019 security vulnerabilities and weaknesses, enabling businesses and organizations to work out corrective and defensive measures against future attacks.<\/span><\/p>\n<h3><b>Pentest: Attack to defend<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Pentest is an important step in protecting the information and data of an organization or network. This requires continuous cybersecurity advancement as attackers are constantly looking to take advantage of security vulnerabilities to crash or infiltrate systems.<\/span><\/p>\n<p><b>First<\/b><span style=\"font-weight: 400\">, pentests help detect security holes in the system. By simulating external or internal attacks, pentests reveal weaknesses that could be exploited by attackers to infiltrate or steal important information.<\/span><\/p>\n<p><b>Second<\/b><span style=\"font-weight: 400\">, pentests provide an overview of the security posture of the system and network environment, thus enabling organizations to evaluate the performance of existing security measures and identify weak areas for improvement.<\/span><\/p>\n<p><b>Third<\/b><span style=\"font-weight: 400\">, pentests enable organizations to comply with security regulations and standards. As a number of industries require compliance with specific information security requirements, pentests will be a useful tool to ensure an organization\u2019s satisfaction of these standards.<\/span><\/p>\n<p><b>Fourth<\/b><span style=\"font-weight: 400\">, pentests help build trust from customers and partners. Positive pentest results show an organization\u2019s commitment towards information and data protection, creating trust and confidence from its partners and customers.<\/span><\/p>\n<p><b>Finally<\/b><span style=\"font-weight: 400\">, defense and attack play mutually reinforcing roles in safeguarding a system. Understanding the system and how to attack it enable you to build a secure one.<\/span><\/p>\n<h3><b>1. Pentest: Choose the right time<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Before deploying a new system: Before deploying a new system or application, pentests help identify and address security vulnerabilities from the development phase, ensuring that the deployed system is highly secure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When changing the system structure: Any change in the system&#8217;s structure can create new security vulnerabilities. Pentests performed after each structural adjustment will help maintain the system\u2019s security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">On a periodic basis: Carrying out pentests periodically, such as every 6 months or annually, is an important part of a security strategy. This helps identify emerging security vulnerabilities and ensure that the system keeps meeting security requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400\">After an incident or attack: If case of security incident or attack, a pentest reassesses the security posture of the system and detects security vulnerabilities that may have been attacked.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When there is a change in the operating environment: Any change in the operating environment such as the expansion or contraction of IT infrastructure can also affect the security of the system. Performing a pentest helps ensure that the system security requirements are met in the new environment.<\/span><\/p>\n<h3><b>2. Pentest service implementation process<\/b><\/h3>\n<h3><b style=\"font-size: 16px\">3. Preparation phase: <\/b><span style=\"font-weight: 400\">Collect customer requirements, determine implementation scope and access boundaries. Set up security regulations to ensure customer systems will not be affected during the pentest implementation process<\/span><\/h3>\n<h3><b style=\"font-size: 16px\">4. Information gathering phase:<\/b><span style=\"font-weight: 400\"> An important phase to collect information and search for potential signs and targets in a computer system or network. This process includes the following steps:<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><b>Open information gathering:<\/b><span style=\"font-weight: 400\"> This is the first step and aims to collect information without penetrating into the system. Open information often includes domain names, contact information, network infrastructure information, etc.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use of automated tools: Pentest experts usually use automated tools such as Nmap, Recon-ng, Maltego, or Shodan to automate information collection. These tools can scan the network to identify hosts, open network ports, services running on those ports, and more.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data analysis: Once information is gathered, experts will analyze the data to understand how the network operates, where systems are located, what services are running, and what vulnerabilities may exist.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Specific target information search: This process involves seeking specific information about targets such as usernames, emails, password encryption, etc., normally through public websites, forums, social networks or other information sources.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Learn about system architecture: Learning about system architecture enables pentest experts to understand how system components connect to each other and how to find potential vulnerabilities in the system.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The information gathering takes place throughout the pentest process.<\/span><\/p>\n<ul>\n<li><b>Information optimization phase: <\/b>Identify targets that require protection, attack targets, and produce a separate checklist that suits the system&#8217;s circumstances based on the collected information. Set up optimized configurations for pentesting software and tools.<\/li>\n<li><b>Foothold establishment phase: <\/b>Gain a foothold via discovered system loopholes after all possible vulnerabilities have been searched and identified.<\/li>\n<li><b>Lateral movement and privilege escalation phase: <\/b>Re-collect information, attack other targets in the system&#8217;s internal network, escalate privileges, and determine the most serious damage that can be done to the system.<\/li>\n<li><b>Reporting and defense recommendations phase: <\/b>Compile a detailed and comprehensive report describing the attack implementation process, and provide practical recommendations to improve the system&#8217;s defense system.<\/li>\n<\/ul>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><b>Exclusive article by FPT IS Technology Experts<\/b><\/p>\n<p><em>Pentest Team \u2013 FPT IS Cyber Security Center<\/em><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"author":3,"featured_media":15543,"parent":0,"template":"","nang_luc":[790,821],"danh_muc_goc_nhin_so":[789],"dich_vu":[540,551,712],"linh_vuc":[],"platform":[],"san_pham":[],"the_goc_nhin_so":[],"class_list":["post-15540","goc_nhin_so","type-goc_nhin_so","status-publish","has-post-thumbnail","hentry","nang_luc-experts-sharing","nang_luc-security","danh_muc_goc_nhin_so-expert-sharing","dich_vu-data-center","dich_vu-digital-gov","dich_vu-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so\/15540","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/goc_nhin_so"}],"about":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/types\/goc_nhin_so"}],"author":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/users\/3"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media\/15543"}],"wp:attachment":[{"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/media?parent=15540"}],"wp:term":[{"taxonomy":"nang_luc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/nang_luc?post=15540"},{"taxonomy":"danh_muc_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/danh_muc_goc_nhin_so?post=15540"},{"taxonomy":"dich_vu","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/dich_vu?post=15540"},{"taxonomy":"linh_vuc","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/linh_vuc?post=15540"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/platform?post=15540"},{"taxonomy":"san_pham","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/san_pham?post=15540"},{"taxonomy":"the_goc_nhin_so","embeddable":true,"href":"https:\/\/fpt-is.com\/en\/wp-json\/wp\/v2\/the_goc_nhin_so?post=15540"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}