Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Ransomware

Key Learnings from “Big Game” Ransomware Campaigns

There are key steps every organization should take to leverage threat and event data across the lifecycle of a cyber incident.

Threat Intelligence Report

A mid-year crypto crime update released in July by Chainalysis found that cryptocurrency related crime was trending downward. The exception was ransomware, which the company predicted was on pace for its second-biggest year with the resurgence of “big game” hunting. Now, with ransomware attacks against major casino operations dominating the headlines, and these same hackers also hitting large companies in sectors including in manufacturing, retail, and technology, the report seems eerily prescient.

The approaches for addressing ransomware attacks are very specific to each organization and unique to the circumstance. Victims have handled the attacks differently – from paying the ransom to fighting it. There’s a lot that goes into these decisions which happen behind closed doors.

However, as other organizations who fall into the “big game” category redouble their efforts around ransomware risk mitigation, there’s a lot of readily accessible data about these campaigns that can help. There are also key steps every organization should take to leverage threat and event data across the lifecycle of a cyber incident. Here are three to consider:

1. Understand the threat. If your board, leadership team, and strategic customers and partners haven’t asked what you’re doing to address the current surge in ransomware, they will. You need to be able to answer questions about these attacks, if they pertain to the organization, and what you are doing to mitigate risk. This requires understanding data about the ransomware campaign, including the adversary utilizing it, their motivations, and the industries they have been known to actively target. There’s no shortage of external data sources to tap into, including commercial, open source, government, industry, existing security vendors – as well as frameworks like MITRE ATT&CK. Not to mention RSS feeds, research blogs, news websites, and GitHub repositories.

You also need an internal understanding of your organization’s vulnerabilities and the capabilities you have in place to defend against it. Not only will this help you communicate with key stakeholders, but also allow you to operationalize the data in preparation for an attack. A platform that aggregates and normalizes all this data and enables you to prioritize it using parameters you set based on your risk profile, security infrastructure, and operational environment will help you confidently address questions about the risk and your ability to mitigate.

2. Identify the internal presence of the threat. If you think a ransomware campaign is already in progress, the groundwork you did to understand the threat may help you get ahead of the attack before data is exfiltrated and systems are locked up. By looking at the intersection of the ransomware campaign and your infrastructure, you can focus your efforts on the most applicable adversaries to your business and the tactics they use. For example, there may be artifacts from the adversary already in your environment, such as a particular IP address, to look for. By correlating that external data with threat and event data from your SIEM or endpoint detection and response (EDR) solution you can quickly zero in on anomalous activity that may indicate the presence of an adversary so you can act with precision and speed.

3. Harden the infrastructure and communicate. Unfortunately, we all know that sophisticated threat actors continually shift tactics and use multiple attack vectors to infiltrate organizations. Once inside, they are also adept at remaining below the radar and establishing persistence, which makes it difficult to detect early and understand the scope of the attack. We have seen this play out in the latest round of ransomware attacks.

At later stages in the attack, threat intelligence can help you improve incident response and mitigate risk. Once you do see an indicator of compromise, to learn more about what is going on and the scope of the attack you can pivot to additional external threat intelligence and dig deeper for greater contextual awareness and understanding. For instance, other artifacts associated with this specific ransomware campaign that you can look for in your other tools and other tactics used that you need to be aware of. As you observe what is happening across your environment, correlating internal and external data to get a complete picture of what is going on, you can quickly determine activity that is part of the ransomware campaign and how that campaign is unfolding. With a platform that is integrated with multiple systems across your security infrastructure you can engage your incident response team to mitigate risk and remediate and you can proactively harden your preventative infrastructure.

Advertisement. Scroll to continue reading.

Coming full circle, you can also communicate with all your key stakeholders to explain what happened, how you addressed it, and give them confidence that the organization is protected against similar attacks in the future. Undoubtedly there’s more to the story of these ransomware attacks that may never be made public. But there’s also a lot of incredibly valuable data that is available for security practitioners. The keys to successfully utilizing this data to mitigate risk is to focus on a smaller subset of data that is relevant to your organization, dig deeper into that data as soon as you suspect an attack is in progress and operationalize that data so you can take the right actions faster.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Ransomware

A SaaS ransomware attack against a company’s Sharepoint Online was done without using a compromised endpoint.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Data Breaches

Sony shares information on the impact of two recent unrelated hacker attacks carried out by known ransomware groups. 

Ransomware

Several major organizations are confirming impact from the latest zero-day exploits hitting Fortra's GoAnywhere software.

Data Breaches

KFC and Taco Bell parent company Yum Brands says personal information was compromised in a January 2023 ransomware attack.

Ransomware

Alphv/BlackCat ransomware group files SEC complaint against MeridianLink over its failure to disclose an alleged data breach caused by the hackers.

Ransomware

Johnson Controls has confirmed being hit by a disruptive cyberattack, with a ransomware group claiming to have stolen 27Tb of information from the company.