Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Looking To Prevent Ransomware? Lock Down These Initial Access Methods First

Nearly three-quarters of all cyberattacks involve ransomware which means a majority of defenders are failing to detect ransomware successfully. The fact is, ransomware isn’t the first stage of the attack, it’s often the last stage; and cyberattacks usually get labeled or categorized as ransomware when data is encrypted or stolen and a ransom is demanded by cybercriminals.

The key to ransomware prevention isn’t discovering methods and tools that help defend against ransomware, which should be part of your ransomware recovery strategy. True ransomware prevention lies in identifying and cracking down on methods of initial access that ransomware operators abuse to get ransomware into the victim’s environment.

Key Initial Access Methods That Lead To A Ransomware Infection

Listed below are some of the most common vectors of initial access used by ransomware attackers:

Social Engineering

Most ransomware attacks start with a phishing email, a malware-laden attachment, link to a malicious website, etc. Victims are social-engineered or tricked into running a malicious program that infects their device, Ransomware groups are evolving their social engineering tactics faster than they are innovating technology to thwart victim networks

Unpatched Software

Threat actors are actively searching the internet for weaknesses in software code and zero-day exploits to break into their targets. More than 76% of vulnerabilities discovered between 2010 and 2019 are still being exploited by ransomware. In 2022, there were about 344 vulnerabilities that could be directly associated with ransomware and this number is growing approximately 19% year over year.

Password Guessing Or Cracking

Why break down windows when you can walk through the door? Threat actors are always looking for ways to steal or hijack user credentials so they can circumvent formal security controls and procedures. They do so by phishing people (creating fake login pages and getting them to enter credentials), by brute forcing passwords or by acquiring credentials from the dark web, of which there are only 24 billion.

Remote Access Services

Remote services such as VPN and remote desktop protocol (RDP) help attackers gain access to victim environments, elevate system access and install malware remotely. It’s worth noting that credentials are a prerequisite to hijacking remote access services and therefore, attackers will again phish users or brute-force RDP logins to breach access. There’s also been a surge in the selling of stolen VPN and RDP credentials on underground forums from a handful of initial access brokers.

Unintentional And Intentional Insider Threats

A quarter of all breaches in 2022 can be attributed to social engineering. When you add human error, misconfigurations and misuse of privileged access, the human element accounts for nearly 82% of all breaches. Attackers are known to leverage poor user practices as a means of delivering ransomware payloads to their targets. In some cases, attackers will even go the extra mile of bribing people. For example, the LAPSUSS ransomware gang famously offered $20,000 bribes to employees working inside of leading tech companies.

How Can Organizations Lock Down These Initial Access Vectors?

Let’s say you want to stop somebody from breaking into your house. One of the first things you must do is figuring how they will get in. A similar analogy applies to ransomware. If you want to prevent hackers from breaking in, you need to understand the most common ways an attacker can get in and then lock down those means of initial access. The above five methods pretty much sums up the initial stages of a ransomware attack and therefore it is important that all organizations focus on locking down these attack vectors by:

Strengthening Security Behavior In Employees: As mentioned earlier, the human factor is responsible for a vast majority of breaches. If employees are reminded of security best practices regularly (strong passwords, verify domain names, think before you click, pause before you download, etc.) and are trained at regular intervals using phishing simulations, testing, and coaching, then this can help develop a sixth sense to remain wary of suspicious emails, texts, etc.

Patching Systems Regularly: Clearly a no-brainer but data shows most organizations are not patching as regularly as they should be. Security teams should deploy a mechanism or process that keeps vulnerabilities in check, ensures that all software is up-to-date and all bug fixes are proactively applied.

Keeping Security Controls In Check: Endpoint detection and response (EDR), phishing-resistant multi-factor authentication, firewalls, anti-spam, password managers, offline backups, are important tools. It's also recommended that security teams disable RDP or limit its use to fewer individuals to prevent its exploitation or misuse. Security teams must also analyze logs, scan for vulnerabilities, and monitor endpoints regularly for any traces of initial access or suspicious activity.

Ransomware is a symptom, not a root cause. Treat your root causes first and watch your symptoms go away. Lock-down the most common methods of initial access by practicing a defense-in-depth approach and this will go a long way in making your organization resilient to ransomware extortion and breaches.

Featured

  • Cyber Overconfidence Is Leaving Your Organization Vulnerable

    The increased sophistication of cyber threats pumped by the relentless use of AI and machine learning brings forth record-breaking statistics. Cyberattacks grew 44% YoY in 2024, with a weekly average of 1,673 cyberattacks per organization. While organizations up their security game to help thwart these attacks, a critical question remains: Can employees identify a threat when they come across one? A Confidence Gap survey reveals that 86% of employees feel confident in their ability to identify phishing attempts. But things are not as rosy as they appear; the more significant part of the report finds this confidence misplaced. Read Now

  • Mission 500 Debuts Refreshed Identity Ahead of Security 5K/2K at ISC West

    Mission 500, the security industry’s nonprofit charity dedicated to supporting children in need across the US, Canada, and Puerto Rico, has unveiled a refreshed brand identity ahead of ISC West. The charity’s new look includes a modernized logo with refined messaging to reinforce Mission 500’s nearly decade-long commitment to serving the needs of children and families in crisis. Read Now

    • Industry Events
  • Meeting Modern Demands

    Door hardware and access control continue to be at the forefront of innovation within the security industry, continuously evolving to meet the dynamic needs of commercial spaces. Read Now

  • Leveraging IoT and Open Platform VMS for a Connected Future

    The evolution of urban environments is being reshaped by the convergence of Internet of Things (IoT) technology and open platform VMS. As cities worldwide grapple with growing populations and increasing operational complexities, these integrated technologies are emerging as powerful tools for creating more livable, efficient, and secure urban spaces. Read Now

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.