Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

NSA Releases Defensive Strategies for Fighting Malware Targeting Corporate Data

The NSA’s Information Assurance Directorate (IAD) issued a report this month laying out best practices for combating malware designed to steal or destroy corporate data.

The NSA’s Information Assurance Directorate (IAD) issued a report this month laying out best practices for combating malware designed to steal or destroy corporate data.

The report, entitled ‘Defensive Best Practices for Destructive Malware’, seems in part aimed at dealing with the type of data-wiping malware at the center of the recent attack on Sony Pictures Entertainment. Much of the advice, the document notes, is also contained in the guidance in the previously published ‘Information Assurance Mitigation Strategies’.

Among the key pieces of advice: segregate network systems, limit workstation-to-workstation communication and protect and restrict administrative privileges for high-level administrator accounts. Organizations are also advised to deploy, configure and monitor application whitelisting to prevent unauthorized or malicious software from executing.

“The earlier that network defenders can detect and contain an intrusion, the less damage the intruder can possibly cause,” according to the report. “In addition to trying to contain an intrusion as early as possible, planning for the possibility of a significant intrusion and potential wide scale destruction of data and systems will be well worth the effort in the event that they are needed. Preparing through offline backups and exercised incident response and recovery plans can make the organization more resilient, enabling quick reconstitution and the resumption of normal business functions as soon as possible.”

Other advice includes:                                       

  • Using network security technologies such as perimeter and application firewalls, forward proxies, sandboxing or other dynamic analysis filters to capture malware when it enters the network
  • Monitor host and network logs
  • Leverage pass-the-hash mitigations to reduce the risk of credential theft
  • Deploy Microsoft’s EMET (Enhanced Mitigation Experience Toolkit) or other anti-exploit tools
  • Patch vulnerable software
  • Use antivirus reputation services to compliment antivirus protections
  • Use host intrusion prevention systems

“Once a malicious actor achieves privileged control of an organization’s network, the actor has the ability to steal or destroy all the data that is on the network,” report continues. “While there may be some tools that can, in limited circumstances, prevent the wholesale destruction of data at that point, the better defense for both industry and government networks is to proactively prevent from gaining that much control over the organization’s network.”

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Malware & Threats

Unpatched and unprotected VMware ESXi servers worldwide have been targeted in a ransomware attack exploiting a vulnerability patched in 2021.

Malware & Threats

Cisco is warning of a zero-day vulnerability in Cisco ASA and FTD that can be exploited remotely, without authentication, in brute force attacks.