visit
If you are not new to cybersecurity, you should recall that the last peak of attention on this issue was in 2017, when the infamous shattered companies and organizations. However, comparing what we are facing now with 2017, we saw a massive leap in the business model and the malware themselves.
Take a step back and review what happened in 2017. Since then, WannaCry was a small-dollar ransom — seeking to collect hundreds of dollars worth of Bitcoin from each company. Still, now, we have supply chain attacks that caused hundreds of thousands or even impacted our critical infrastructures.
According to an analysis by cybersecurity company (Q1, 2021), the average ransom payment in the first three months of 2021 was USD220,298 — a significant rise from USD154,108 in the last quarter of 2020.
(Q3, 2020) gives us more insight into this matter. The report shows that nearly half of ransomware attacks steal data before the encryption begins. As a result, more and more ransomware attacks are no longer just a business continuity or disaster recovery matter but also data thefts and even a complete cybersecurity incident response.
Criminals now put several layers of extortion in place; some even threaten to or in the event of unsuccessful ransom (nonpayment), notifying them of the cyberattacks. All those threats give cybercriminals various opportunities to monetize their attack, for example:
Ransomware-as-a-service (RaaS) is a subscription model that allows affiliates to use already-developed ransomware tools to launch ransomware attacks. In the end, affiliates earn a percentage of each successful ransom payment. Ransomware-as-a-Service (RaaS) adopts the Software as a Service (SaaS) business model, like what we use in other cloud computing technologies.
RaaS users don't need to be skilled or even experienced to use the attack tool like all SaaS solutions. RaaS empowers even novel hackers (or simply criminals without a technical background) to launch highly sophisticated cyberattacks. This low technical barrier, and prodigious affiliate earning potential, make RaaS engineered explicitly for victim proliferation.
Large corporations will continue to be the victims of sophisticated ransomware attacks. However, new and less-skilled threat actors will join the market due to the malware-as-a-service and ransomware chains. These groups will have SMBs as their prime targets.
A ransomware attack is, in fact, the last stage of an attack cycle. According to ,
In some cases, ransomware deployment is just the last step in a network compromise and is dropped as a way to obfuscate previous post-compromise activities.
TA0040 — (That's where Ransomware takes place!)
In the same guide, it described what we called "":
A ransomware infection may be evidence of a previous, unresolved network compromise. For example, many ransomware infections are the result of existing malware infections, such as TrickBot, Dridex, or Emotet.
Security professionals within the company may see some abnormal activities and suppose the firewalls or endpoint detection and response (EDR) agent has detected it and shielded them. However, it's maybe just the precursor. Meanwhile, the security operations may be bombarded by unrelated alerts to which they are paying more attention than the precursor malware, which seemed less harmful.
As a result, the warning signs are hidden in different stages of an attack operation. Once we can map the tactics and look at them from a holistic point of view, we will have a better chance to spot the Ransomware before it happens.
Once we know what to protect, we can apply a risk-based approach to each step of the attack kill chain. For that, we need the Cybersecurity Framework (CSF). The is a set of best practices organizations can use to secure their data. Built by the , the Framework was designed to make cost-effective security possible for organizations of any size.
Also, we need to understand that cyberattack is a process — a set of activities that must be performed in the proper order, with specific duration and location. For instance, Ransomware is the result of a cyberattack. So if we can stop one of the steps before that, it is possible to prevent a Ransomware attack in the first place.
CSF is a great starting point for finding the countermeasures against attacks in various MITRE ATT&CK® Tactics. One eminent way to align the CSF objectives to real cyber threats is by leveraging , which emulate adversarial tactics and techniques against leading cybersecurity products.
The information is then made available to industry end-users to see how products are performed and align with organizational security objectives. Another excellent resource from MITRE is the Center for and .
This project makes a comprehensive and open, curated set of mappings between 800–53 controls and ATT&CK techniques. As a result, defenders can focus on understanding how the security controls in use in the environment relate to adversary TTPs of interest.
These mappings provide an essential resource for organizations to assess the security control coverage against real-world threats defined in the and provide a foundation for integrating ATT&CK-based threat information into the risk management process. With every ransomware attack that came with other malware before it and paving the way, managing the precursor malware when it occurs can decrease the number of ransomware incidents.
Meanwhile, for a private organization, the focus should instead be on reducing the attack surface and building the fundamentals of a comprehensive security operation. This includes:
My recommendation is to deal with minor problems (alerts/ events) so that you don't have to face catastrophic attacks. It isn't easy to find something we're not directly looking for. A better way to handle that is a change in mindset — from preventing all the attacks to assuming infections are unavoidable. And with that, you can let all your security measures work together and hopefully prove otherwise.