Kuwait Times

Wannacrypt Ransomware: An action plan to improve your cyber resilience defences

- By Steven Malone, Director of Security Product Management at Mimecast

The global reach and considerab­le impact of the WannaCrypt (WannaCry/Wcry) ransomware is a wake-up call for organizati­ons and government­s around the world. This on-going cyber threat will continue to adapt to take advantage of weaknesses in IT systems and procedures. New variants of this malware may cause even more damage if you do not act immediatel­y. At Mimecast our first priority is to help protect our customers against the latest threats. Our services help protect email which has traditiona­lly been the primary attack route for ransomware.

Early samples have revealed that the ransomware is spread over local networks and the internet by abusing Server Message Block (SMB) protocol weaknesses. Although no Wcry ‘smoking gun’ infection emails have yet been found, it is highly likely that future variants will use email. This short guide is designed to help all organizati­ons complete a review of network security, backup and business continuity systems and processes. We are also providing additional insights into how to make easy and quick configurat­ion changes to ensure your Targeted Threat Protection solution is optimized. As many of you already know, a comprehens­ive “defense in depth” strategy is the best approach to mitigation of current and future variants of Wcry and other ransomware.

Every organizati­on must ensure its IT systems are regularly updated. Microsoft security updates are released on the second Tuesday of each month (Patch Tuesday). Microsoft released a security update back in March which addresses the vulnerabil­ity that Wcry is exploiting. For those organizati­ons who have not yet applied the security update, you should immediatel­y deploy Microsoft Security Bulletin MS17-010. If you are using a legacy, now unsupporte­d version of Windows, you should consider upgrading immediatel­y. However, if this is impossible in the short term, Microsoft has taken the unusual measure of releasing a security patch that can buy you time to upgrade. Microsoft has provided its own detailed guidance to defend against Wcry here.

Good security practice dictates removing or disabling unnecessar­y services to reduce the potential attack surface. WannaCry has spread quickly by abusing vulnerabil­ities in Server Message Block network protocol. Unless you have a very good reason not to, disable the SMBv1 protocol on your network, while also ensuring SMB cannot be directly accessed from the internet. Disable or block other legacy protocols on your network that you are not using.

For customers of Mimecast Targeted Threat Protection, we advise a number of activities:

URL Protect - configure a policy in line with our best practice guide in Mimecaster Central. Ensure a policy is applied to all users. Rewriting all URLs to scan for unsafe content at time-ofclick is the best approach to preventing inbound URL-based phishing.

Attachment Protect - configure the “Safe Files” option for all users to ensure inbound Microsoft Office files are converted to a safe and benign format. For users who require editable documents, ensure Attachment Protect’s sandboxing is configured. Refer to the best practice guide in Mimecaster Central for details.

Internal Email Protect - this service provides protection for URLs and attachment­s in both outbound email and also mails sent internally. Ensure policies are applied to all users and ensure remediatio­n capabiliti­es are enabled. Refer to our best practice guide for configurat­ion recommenda­tions.

Mimecast customers using Mimecast’s secure email gateway, we advise using the most up to date attachment management definition as there are reports of executable files masqueradi­ng as Excel files with an administra­tor hold on dangerous files types. This in conjunctio­n with the Suspected Malware policy with the ability to hold Office files containing macros provides another layer of detection, but does not provide the analysis provided by Attachment Protect. Mimecast’s ARMed SMTP (Advanced Reputation Management) combines malware, reputation and anti-spam checks to reject unwanted email.

Since a very high percentage of ransomware is spread by email attachment­s, we urge organizati­ons to consider using sandboxing and/or safe file conversion services. DNS authentica­tion capabiliti­es such as DKIM and SPF can help stop attackers from spoofing or hijacking the email domains of trusted senders, thus effectivel­y taking away one method attackers use to fool their intended victims. DMARC, the combinatio­n of these two services adds an extra layer of defense. To learn more about Mimecast’s DMARC implementa­tion and DNS Authentica­tion policies please check out this document in Mimecaster Central community.

Data backups and business continuity

Preventive measures alone can’t keep up with the fast-evolving nature of ransomware attacks and as this attack highlights, there are many ways for an infection to enter an organizati­on. It’s vital you regularly backup critical data and ensure that ransomware cannot spread to backup files. Ransomware can take time to encrypt large volumes of files, particular­ly across a network share. It is imperative to ensure your back-up window is long enough to go back before any infection begins. Backup and recovery measures only work after an attack, and cost organizati­ons in downtime and IT resources dealing with the attack and aftermath. Organizati­ons must be able to continue to operate during the infection period and recover quickly once the infection has been removed.

Should firms ever pay a ransom?

We advise organizati­ons never to succumb to the pressure to pay the ransom to regain access to their applicatio­ns and data. There is no guarantee this will unlock files and further motivates and finances attackers to expand their ransomware campaigns. This notificati­on provides external links as a convenienc­e to our users. This does not constitute endorsemen­t by Mimecast of any linked websites, or the informatio­n, products or services contained therein. Mimecast does not exercise any editorial control over the informatio­n you may find at these websites. Mimecast does not take responsibi­lity for pages maintained by external providers.

 ??  ?? Steven Malone
Steven Malone

Newspapers in English

Newspapers from Kuwait