1
play

1 February 4, 2020 Ransomware works Who: Ransomware is a threat - PowerPoint PPT Presentation

Geoff Hale 1 February 4, 2020 Ransomware works Who: Ransomware is a threat vector that is rife for bad actors, both criminal enterprises and nation-states have made use of ransomware. What: Ransomware is a type of malware that encrypts


  1. Geoff Hale 1 February 4, 2020

  2. Ransomware works ▪ Who: Ransomware is a threat vector that is rife for bad actors, both criminal enterprises and nation-states have made use of ransomware. ▪ What: Ransomware is a type of malware that encrypts the files on a user’s device or a network’s storage devices. ▪ Where: Top three targeted groups: (1) Municipalities, (2) schools, (3) hospitals. Clearly hitting the underrepresented/more vulnerable. ▪ When: Timing has seemed opportunistic, not strategic ▪ Why: Ransomware is a business model that works, victims are paying higher and higher ransoms. The willingness for victims and their insurers to pay out incentivize further use of ransomware. ▪ How: Ransomware-as-a-service kits mean nearly anyone can try their hand at a running a scam. Decades of lack of investment in IT, and a focus on systems operating more than system security, has left organizations across the country vulnerable to attack by ransomware actors. Geoff Hale 2 February 4, 2020

  3. Very Familiar Guidance ▪ Start with good cyber hygiene Prevent It Contain It Plan to Recover • Ask for help! Contact CISA, the FBI, or • Segment your networks; make it hard Vulnerabilities: the Secret Service The Technical and The People for the bad guy to move around and • Work with an experienced advisor to infect multiple systems help recover from a cyber attack • Always be patching. • Limit access- Apply the principle of • Know your system’s baseline for • Educate on phishing. least privilege to all systems and recovery • Don’t rely on people, authenticate services. • Review disaster recovery procedures • Enforce access controls- Multi-factor inbound email to prevent receipt of and validate goals with executives • Restricting user and third-party spoofed emails. • Filter executable files from reaching permissions to install and run software end users applications can help prevent malware from executing and spreading. Geoff Hale 3 February 4, 2020

  4. CISA’s support Know your vulnerabilities Proactive Vulnerability Scanning Remote Penetration Testing No cost, just ask… Educate to protect your people CIOCC@CISA.dhs.gov (888)282-0870 Phishing Campaign Assessments CISA Trainings If it happens… Incident Response Technical Expertise Geoff Hale 4 February 4, 2020

  5. Before Their Problem Becomes Yours ▪ Attackers looking to increase their likelihood of receiving payment want to spread to as many victims as possible ▪ Managed Service Providers have been targeted to both exploit and propagate ransomware ▪ Know who has access to your systems, and what actions they’re authorized to take. ▪ We’ve seen State and local governments enable MSPs to have persistent access and sweeping administrative privileges. If the MSP is hit with ransomware, there’s a high risk of their compromise. Geoff Hale 5 February 4, 2020

  6. Geoff Hale Director, Election Security Initiative Department of Homeland Security Geoffrey.Hale@hq.dhs.gov Geoff Hale 6 6 February 4, 2020

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend