CONFERENCE On Demand: Cyber AI & Automation Summit - Watch Now
Connect with us

Hi, what are you looking for?



Ransomware Risk Assessment Service Aims to Deflect Attacks

The function of cybersecurity is not to eliminate all attacks and compromises – that’s impossible – but to make the attack so expensive and time-consuming on the attacker that he simply moves on to an easier target. That is the purpose of a new product/service designed to make commodity ransomware attacks less easy for the attacker.

The function of cybersecurity is not to eliminate all attacks and compromises – that’s impossible – but to make the attack so expensive and time-consuming on the attacker that he simply moves on to an easier target. That is the purpose of a new product/service designed to make commodity ransomware attacks less easy for the attacker.

Security experts at Qualys have analyzed 36 leading ransomware families and their attacks over the last five years. They find that unpatched vulnerabilities, device misconfigurations, internet-facing assets and unauthorized software consistently rank among the top attack vectors.

Leveraging its own VMDR cloud platform and applying the results of its research, Qualys has developed a tailored service – the Ransomware Risk Assessment Service – designed to detect and remediate the most common routes taken by ransomware attacks. 

Their researchers isolated the 110 CVEs most used by the criminals in these attacks. In almost all cases, these vulnerabilities have been patched by the vendor, but left unpatched by the victim. For example, the top five CVEs exploited by ransomware gangs are CVE-2013-1493 (used by Exxroute, vendor patched in March 2013); CVE-2013-0431 (used by Reveton, patched in February 2013); CVE-2012-1723 (Urausy, June 2012); CVE-2019-1458 (NetWalker, December 2019); and CVE-2018-12808 (Ryuk/Conti, August 2018). 

If these CVEs had been patched by the victims, the attacker would be required to find a different entry point, or just as likely moved on to an unpatched site. As it stands, a Qualys report suggests that just these five CVEs have, through ransomware, “negatively impacted millions of assets across organizations worldwide.”

The importance of patching is well understood – the continued failure of organizations to patch thoroughly is less easy to understand. A study by Trustwave at the end of September 2021 found that despite all the warnings and publicity, more than 20% of the world’s Microsoft Exchange Server installations had not patched the ProxyShell and ProxyLogon vulnerabilities by August 31, 2021. This is concerning. If whitehat researchers can discover these servers, it is certain the blackhat criminals also know them.

So, the cornerstone of the Qualys service is to first locate the existence of these vulnerabilities, and then automatically patch them. This requires complete knowledge of the customer’s IT real estate – a knowledge that many companies do not have. New servers are spun up in the cloud, used for a single purpose (such as testing) and then forgotten and abandoned, but still extant. Other servers are just abandoned in the data center, replaced by newer hardware but still connected to the internet. Anything connected to the internet can be found and exploited by the criminals, but may effectively be unknown to the company.

Part of the Qualys solution includes a global asset discovery and software inventory that locates and identifies all internet-facing assets and unauthorized software to eliminate the blind spots in a company’s security defenses. The necessary patches can then be applied automatically to everywhere they are needed.

Advertisement. Scroll to continue reading.

Ransomware Exposure Points

Qualys Ransomware Risk Assessment dashboard

This just leaves misconfigurations as the remaining attack vector leveraged in ransomware attacks. The researchers have isolated the most used misconfiguration, such as insecure RDP and admin shares, and have mapped them to the relevant MITRE ATT&CK techniques. The result is 237 configuration checks across five security areas such as RDP hardening, user controls, network, protocol, and port configuration security, share and password policies and software update policies – enabling companies to shut down 20 of the attack techniques used in ransomware.

“Ransomware risk is top of mind for CISOs who are no longer satisfied with reactive tools and generic guidelines. They want actionable information to reduce risk proactively,” says Sumedh Thakar, president and CEO of Qualys. “The Qualys security team has extensively researched past ransomware attacks as well as CISA, MS-ISAC and NIST guidance and operationalized it into a prescriptive, actionable plan so companies can proactively remediate to stay ahead of ransomware attacks and reduce their overall risk.” 

The result is not a solution to ransomware, but a way in which individual companies can harden their systems against ransomware. It is the same principle used in physical policing – a long-standing concept known as CPTED (crime prevention through environmental design). CPTED does not prevent crime delivered by a determined criminal, but it makes it too difficult for the average criminal who will simply move on to a less secure target

“While there is no silver bullet to prevent ransomware, companies can take charge with proactive measures including solid cybersecurity hygiene, patching for known ransomware vulnerabilities, changing configurations and adjusting security policies,” said Jim Reavis, co-founder and CEO of the Cloud Security Alliance. “Qualys Ransomware Risk Assessment puts cybersecurity teams in control by operationalizing government guidelines and providing a company-specific ransomware heatmap so they can eliminate an area of risk and shrink their attack surface.”

The Qualys Ransomware Risk Assessment service, like CPTED, does not eliminate the crime – it is aimed at deflecting the criminal to an easier victim.

Related: CISA Adds Ransomware Module to Cyber Security Evaluation Tool

Related: Two ‘Prolific’ Ransomware Operators Arrested in Ukraine

Related: Links Found Between MSHTML Zero-Day Attacks and Ransomware Operations

Related: FBI: 16 Conti Ransomware Attacks Targeted Healthcare, First Responders in U.S.

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join us as we delve into the transformative potential of AI, predictive ChatGPT-like tools and automation to detect and defend against cyberattacks.


As cybersecurity breaches and incidents escalate, the cyber insurance ecosystem is undergoing rapid and transformational change.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.


As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...


Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.