{"id":38260,"date":"2020-02-06T15:17:05","date_gmt":"2020-02-06T11:17:05","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=38260"},"modified":"2022-07-14T17:52:26","modified_gmt":"2022-07-14T13:52:26","slug":"ransomware-attack-scenarios-and-how-to-be-protected","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/ransomware-attack-scenarios-and-how-to-be-protected\/","title":{"rendered":"Ransomware Attack Scenarios"},"content":{"rendered":"<p>One of the reasons why ransomware\u2019s influence is so great is that there are multiple ways in which ransomware attacks can occur. As an MSP, protecting your clients\u2019 businesses from ransomware requires being familiar with all of the ransomware attack scenarios and taking steps to defend against each of them.<\/p>\n<p><!--more--><\/p>\n<p>With that need in mind, this article describes common ransomware attack scenarios and what to do if one of these attacks affects your clients.<\/p>\n<h2>Types of Ransomware Attacks<\/h2>\n<h3>Phishing<\/h3>\n<p>Phishing is a type of exploit where an attacker convinces someone inside an organization to take an action (such as clicking a link inside an email or revealing login credentials) that allows the organization\u2019s systems to be compromised. If attackers can gain this access, they can encrypt the organization\u2019s data and hold it to ransom.<\/p>\n<blockquote><p>Email is the most common vector for executing phishing attacks, but it\u2019s not the only one. Phone calls, SMS messages and even physical documents can be distributed to employees inside an organization in an attempt to trick them into revealing sensitive information.<\/p><\/blockquote>\n<p>When phishing, attackers often make a message appear to come from someone legitimate by, for example, creating a fake email account pretending to belong to a person from the same organization or to a vendor you partner with. These strategies can make it easier to convince someone inside the organization to fall for the phishing attack, even if anti-phishing systems mark the message as coming from outside their own organization.<\/p>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/types-of-phishing\/\">Types of Phishing Attacks<\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE ASSETS<\/div>\n<div class=\"call-to-action__title\">MSP\u2019s Assets to Stay Safe from Phishing<\/div>\n<div class=\"call-to-action__text\">Check out our assets that will help you to minimize the risk of a phishing attack, reduce the possible damage, and increase security awareness.<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-a13a0279-a667-42d1-8ecd-608964d3c162\" data-portal=\"5442029\" data-id=\"a13a0279-a667-42d1-8ecd-608964d3c162\"><span class=\"hs-cta-node hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\" id=\"hs-cta-a13a0279-a667-42d1-8ecd-608964d3c162\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-a13a0279-a667-42d1-8ecd-608964d3c162\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/a13a0279-a667-42d1-8ecd-608964d3c162.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Phishing_CTA-1.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<h3>Remote Desktop Protocol<\/h3>\n<p>Remote Desktop Protocol, or RDP, is a widely used protocol for accessing computers from remote locations. Because RDP gives remote users the same level of access to a system that they would have if they were sitting in front of it and logged in, compromising RDP is a ransomware attacker\u2019s dream scenario.<\/p>\n<p>Although RDP is secure when configured properly, there are several ways in which poorly secured RDP connections could be used to install ransomware inside an organization:<\/p>\n<ul>\n<li><strong>Weak user credentials<\/strong>: Attackers could gain access by taking advantage of weak RDP passwords that they can guess or brute-force. The absence of <a href=\"https:\/\/www.msp360.com\/resources\/blog\/mfa-for-msps\/\">multi-factor authentication<\/a>, and the use of the same account for multiple types of applications, makes weak user credentials easier to exploit.<\/li>\n<li><strong>RDP open to the Internet<\/strong>: If RDP ports are accessible from the public Internet, they are very easy for attackers to find and scan for vulnerabilities. It\u2019s best to keep RDP connections behind a firewall so that they are available only to users who are in a physical location (such as their office) or (if they are working remotely) logged into a company\u2019s VPN.<\/li>\n<li><strong>Outdated RDP tools or protocols<\/strong>: If RDP applications, or RDP itself, are not kept up-to-date, they may contain known security flaws that attackers can exploit to break in and install ransomware.<\/li>\n<li><strong>Privileged RDP account<\/strong>: A compromised RDP connection is bad. It\u2019s even worse if the account that was compromised has admin permissions. That\u2019s why it\u2019s a best practice to follow the principle of least privilege, which means that the minimum privileges necessary should be assigned to each account. Unless there is a specific reason for an admin account to require RDP access, this configuration should be avoided.<\/li>\n<\/ul>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/4-ways-to-improve-your-remote-desktop-security\/\">4 Ways to Improve Your Remote Desktop Security<\/a><\/p>\n<h3>Application Exploits<\/h3>\n<p>Any application -- even one as simple as Windows Calculator -- can potentially be exploited by an attacker to gain unauthorized access to a system and install ransomware.<\/p>\n<p>That is true no matter how up-to-date applications are, or which version of an operating system a user is running. However, there are a few practices in particular that can lead to application exploits:<\/p>\n<ul>\n<li><strong>Modified settings<\/strong>: Applications that are configured in ways they were not designed for could open up vulnerabilities. Before changing settings in an application, review its documentation to make sure you are not configuring it improperly.<\/li>\n<li><strong>Saved passwords:<\/strong> Applications may save passwords from previous logins, giving attackers easy access. It's best practice to disable saved passwords. (Check other <a href=\"https:\/\/www.msp360.com\/resources\/blog\/password-management\/\">password management best practices<\/a>.)<\/li>\n<li><strong>Compromised websites:<\/strong> Websites that host malicious software may attempt to install that software on users\u2019 computers. Web browsers should be configured to mitigate this risk. In especially sensitive environments, you could even consider running user applications inside a virtual machine that is restored to a previous \u201cclean\u201d state automatically after every session; that way, any malware installed during a session will be erased when the user logs out.<\/li>\n<\/ul>\n<h3>Physical Intrusion<\/h3>\n<p>It\u2019s easy to overlook the risk of an attacker gaining physical access to systems, but it\u2019s a real scenario. Organizations with poor physical security have little to protect them from someone simply walking into an office, sitting down at a workstation and deploying ransomware.<\/p>\n<p>This is true even at organizations that take basic steps to address the needs of physical security. For example, keeping doors locked is no guarantee that an intruder won't sneak in behind someone else, or break a lock after hours.<\/p>\n<p>Read our article to learn more about other <a href=\"https:\/\/www.msp360.com\/resources\/blog\/types-of-malware-attacks-msps-should-protect-clients-from\/\">types of malware attacks<\/a> MSPs should know.<\/p>\n<h2>Responding to Ransomware Attacks<\/h2>\n<p id=\"last\">It's important for MSPs to be prepared with a response plan in case their clients' systems (or even their own systems) are attacked with ransomware.<\/p>\n<div id=\"slidebox\"><a class=\"close\">\u00a0<\/a><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p>The basic steps to follow when responding to a ransomware attack include:<\/p>\n<ul>\n<li><strong>Analysis<\/strong>: Perform a full analysis of the attack to identify which devices were infected, and ensure that the attack vector is no longer active.<\/li>\n<li><strong>Antivirus run<\/strong>: Scan all affected systems with antivirus software to identify any known exploits that were introduced with the ransomware. It's important to make sure that all malware has been removed before restoring operations; otherwise, data could be re-compromised after the restore. (Choose an <a href=\"https:\/\/www.msp360.com\/resources\/blog\/top-5-antivirus-solutions-for-managed-service-providers\/\">MSP antivirus<\/a> that suits your needs.)<\/li>\n<li><strong>Recovery<\/strong>: Once systems have been confirmed to be free of ransomware, you can recover data from backups, and allow customers to resume normal operations. Check our guide with <a href=\"https:\/\/www.msp360.com\/resources\/blog\/data-recovery-best-practices-for-msps\/\">data recovery best practices<\/a>.)<\/li>\n<li><strong>Harden operations<\/strong>: With operations restored, you can now take steps to harden systems to prevent another ransomware attack. Make sure software is up-to-date, address weaknesses in your <a href=\"https:\/\/www.msp360.com\/resources\/blog\/email-firewall-comparison\/\">firewall<\/a> configuration, enforce <a href=\"https:\/\/www.msp360.com\/resources\/blog\/two-factor-authentication-solutions\/\">multi-factor authentication<\/a>, and so on. You may also consider deploying pre-installed anti-ransomware tools like Malware and Ransomware protection in Office 365.<\/li>\n<\/ul>\n<p><span class=\"further-reading \">Further reading<\/span> <a href=\"https:\/\/www.msp360.com\/resources\/blog\/os-hardening-checklist-and-best-practices\/\">OS Hardening Checklist<\/a><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\">\n<div class=\"call-to-action__tag\">FREE WHITEPAPER<\/div>\n<div class=\"call-to-action__title\">Steps for Keeping Backup Data Safe from Ransomware<\/div>\n<div class=\"call-to-action__text\">Find out the main strategies for protecting data backups from ransomware<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" data-portal=\"5442029\" data-id=\"08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\"><span class=\"hs-cta-node hs-cta-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" id=\"hs-cta-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/08a8e1eb-8f5c-442c-9d09-fa18e74ef9a6.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<div class=\"call-to-action__right\"><img decoding=\"async\" style=\"max-width: 300px;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/03\/Group-176.png\" alt=\"WP icon\" \/><\/div>\n<\/div>\n<p>You might also want to learn more about <a href=\"https:\/\/www.msp360.com\/ransomware-protection\/\">ransomware protection with MSP360<\/a>.<\/p>\n<h3>Recovering from Ransomware if Backups Were Infected<\/h3>\n<p>The steps above assume that you have a ransomware-free backup copy of data that you can use for the restore. Unfortunately, that is not always the case. Your data retention policy might not have saved data long enough to ensure that a copy from before the attack is preserved. Or, your backups themselves could have been compromised during the attack (which won't happen if you remembered to store at least one copy of your backups in an offline location, but you may forget to do this).<\/p>\n<p>In these situations, recovery is harder, but all hope is not necessarily lost. You may still be able to recover through the following strategies:<\/p>\n<ul>\n<li><strong>Reconstruct data from other sources:<\/strong> In attacks of limited scope, you may be able to find sources of data that weren't compromised during the attack, and use them to recover. For example, perhaps you can find an employee who was on vacation and whose laptop was turned off during the attack. In that case, you could use data from the laptop as the basis for recovery. This approach will require more effort, and might not preserve all of the data, but it's preferable to paying a ransom.<\/li>\n<li><strong>Look for a decryption key online.<\/strong> In some cases, resolving ransomware may be as simple as obtaining a publicly available decryption key or following another known procedure for decrypting the affected data. So, although it may seem obvious, make sure you Google or ask in relevant forums for a solution.<\/li>\n<li><strong>Pay the ransom.<\/strong> As a last resort, you can always pay the ransom (and hope the attackers actually provide a decryption key in response). Of course, if you back up your data, you avoid this embarrassing and risky outcome.<\/li>\n<\/ul>\n<h2>Conclusion<\/h2>\n<p>Ransomware comes in many forms, and there is no way to guarantee immunity against it. But there are steps you can take to minimize the risk of your clients' systems (or your own systems) falling victim to ransomware in the first place. And by keeping data backed up, storing at least one copy of the backups in an offline location, and having the right <a href=\"https:\/\/www.msp360.com\/resources\/blog\/how-to-build-retention-policy\/\">retention policies<\/a> in place, you place yourself in a position to recover from a ransomware attack without having to pay the ransom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the reasons why ransomware\u2019s influence is so great is that there are multiple ways in which ransomware attacks can occur. As an MSP, protecting your clients\u2019 businesses from ransomware requires being familiar with all of the ransomware attack scenarios and taking steps to defend against each of them.<\/p>\n","protected":false},"author":82,"featured_media":44466,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[878,888],"tags":[912],"class_list":["post-38260","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp-university","category-security-guides","tag-how-to-be-protected-against-ransomware"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/38260","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/82"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=38260"}],"version-history":[{"count":3,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/38260\/revisions"}],"predecessor-version":[{"id":54370,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/38260\/revisions\/54370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/44466"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=38260"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=38260"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=38260"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}