Sophos XG Firewall - Best Practices to Block Ransomware

Ransomware attacks are only increasing in complexity and are getting more efficient at exploiting network and system vulnerabilities, leaving organizations with a significant clean-up bill. Modern firewalls are highly effective at defending against these types of attack, but they need to be given the chance to do their job.



How Ransomware Attacks Spread


2018 has seen ransomware trending away from brute force, large scale attacks to focused, planned and manually executed attacks that are much harder to detect and block. Let’s take a look at how the different forms of ransomware operate and what your organization should be doing to minimize vulnerability to an attack.


Targeted Ransomware Attacks


As the name suggests targeted ransomware attackers have done their homework. They know who you are, they know your organization, if you are capable of paying the ransom, as well as how much you might be willing to pay.

They have gained access to your organization’s network and can see and control the damage they are causing. And they adapt. If they hit a roadblock they work around it again and again until they succeed. They don’t go after difficult targets with advanced security – why bother? There is enough low-hanging fruit for them to stay in business.

Variants including Dharma, SamSam and BitPaymer are some of the most well-known and most successful types of targeted ransomware. While these examples vary in their scope and complexity, they share many commonalities in their methods.


A typical targeted ransomware attack looks like this:


+ Gain entry via a remote file sharing or management feature like Remote Desktop Protocol (RDP) or FTP, through brute-force hacking or simply guessing a weak password

+ Escalate privileges until they are an administrator. (Attackers exploit system vulnerabilities to gain privilege levels that let them bypass security software)

+ Bypass any security software. (With escalated privileges attackers can run tools such as third-party kernel drivers that can disable processes and force delete files, bypassing protections that stop them uninstalling security software directly)

+ Spread ransomware that encrypts the victim’s files Utilize network and host vulnerabilities or basic file sharing protocols to compromise other systems on the network and spread file-encrypting ransomware

+ Leave a ransom note demanding payment for files to be unencrypted

+ Wait for the victim to contact them via email or a dark web website

Consequences for falling victim to these attacks can be severe. In addition to the significant downtime and lost business productivity is the ransom demand itself. SamSam demands around US$50,000 in bitcoins, while BitPaymer has been known to ask for an eye-watering US$500,000 for encrypted files to be unlocked.


Remote Desktop Protocol or Ransomware Deployment Protocol?


Remote Desktop Protocol (RDP) and other desktop sharing tools like Virtual Network Computing (VNC) are innocuous and highly useful features of most operating systems that allow staff to access and manage systems remotely. Unfortunately, without the proper safeguards in place it also provides a convenient in-road for attackers and is commonly exploited by targeted ransomware.

Not properly securing RDP and other similar remote management protocols behind a Virtual Private Network (VPN) or at least restricting which IP addresses can connect via can leave you wide open to attackers. Attackers that use brute-force hacking tools which try hundreds of thousands of login/password combinations until they get the right one and compromise your network.


Worm-based Ransomware


2017 was the year of ransomware attacks such as WannaCry and Petya that crippled countless organizations and infected hundreds of thousands of computers around the world. These particular attacks spread by exploiting a vulnerability in Microsoft’s Server Message Block (SMB) network file-sharing protocol. This protocol is ubiquitous on corporate LANs and allows computers to discover each other for the purpose of sharing files and other resources like printers. It can also be used for file sharing outside the firewall if the necessary ports (TCP 139 and/or 445) are opened or forwarded on the firewall.

The particular exploit used by WannaCry and Petya is known as EternalBlue. EternalBlue allows remote code execution by sending carefully crafted messages across the network to the vulnerable SMB service on computers running Microsoft Windows.

In general every networked system, whether running Windows, Linux, Mac OS or another operating system relies on a variety of services for network functionality and occasionally new vulnerabilities are discovered in these services that can have dire consequences if exploited.


In the case of the EternalBlue exploit, Microsoft quickly issued a patch for the vulnerability (MS17-010). But hackers acting rapidly were able to strike before many organizations had time to roll out the patch.




How to Stay Protected from Ransomware


Even in the most diligent organizations, there’s always a gap between vulnerability discovery and patch deployment, which is why it’s so important to have leading next-gen technology protecting your network and endpoints from these kinds of attacks.

So how can you protect your organization from letting these attacks into the network in the first place? And if an attack should somehow penetrate your network, how can you prevent it from spreading, infecting other systems in its wake?


Lockdown Remote Management


Locking down your organization’s Remote Desktop Protocol access and other management protocols is one of the most effective steps you can take to secure against targeted ransomware attacks. There are numerous ways you can do this – require users be on a VPN before they can access RDP, restrict access to known IP addresses. Your organization’s firewall should be able to implement both of these methods.


Blocking Network Exploits


IPS (Intrusion Prevention System) is a critical security component of any next-gen firewall as it performs deep packet inspection of network traffic to identify vulnerability exploits and block them before they reach a target host. IPS looks for patterns or anomalies in the code that either match a specific exploit or a broader target vulnerability.

As with the EternalBlue exploit discussed earlier, these attacks typically attempt to send malicious inputs to a host application or service to compromise it and gain some level of control to ultimately execute code – such as a ransomware payload in the case of Wanna and Petya.


Blocking File-Based Ransomware Payloads


While Wanna and Petya spread like worms, many ransomware variants leverage social engineering tricks through phishing email attacks, spam, or web downloads to gain entry to your network through more conventional means. These attacks often start as cleverly crafted malware lurking in common files like Microsoft Office documents, PDFs, or executables such as updates for common trusted applications. Hackers have become very effective at making these files seem benign or obfuscating the malware to get past traditional signature-based antivirus detection.

As a result of this new breed of file-based malware, sandboxing technology has become an essential security layer at your network perimeter. Fortunately, cloud-based sandboxing typically doesn’t require any additional hardware or software deployment – it simply identifies suspect files at the gateway and sends them to a safe sandboxing infrastructure in the cloud to detonate active content and monitor the behavior over time. It can be extremely effective at blocking unknown threats like new ransomware attacks before they enter the network.


Best Practices for Firewall and Network Configuration


It’s important to keep in mind that IPS, sandboxing and all other protection the firewall provides is only effective against traffic that is actually traversing the firewall and where suitable enforcement and protection policies are being applied to the firewall rules governing that traffic. So with that in mind, follow these best practices for preventing the spread of worm-like attacks on your network:

Ensure you have the right protection, including a modern high-performance next-gen firewall IPS engine and sandboxing solution.

Lockdown RDP with your firewall. Your firewall should be able to restrict access to VPN users and whitelist sanctioned IP addresses.

Reduce the surface area of attack as much as possible by thoroughly reviewing and revisiting all port-forwarding rules to eliminate any non-essential open ports. Every open port represents a potential opening in your network. Where possible, use VPN to access resources on the internal network from outside rather than port-forwarding.

Be sure to properly secure any open ports by applying suitable IPS protection to the rules governing that traffic.

Apply sandboxing to web and email traffic to ensure all suspicious active files coming in through web downloads and as email attachments are being suitably analyzed for malicious behavior before they get onto your network.

Minimize the risk of lateral movement within the network by segmenting LANs into smaller, isolated zones or VLANs that are secured and connected together by the firewall. Be sure to apply suitable IPS policies to rules governing the traffic traversing these LAN segments to prevent exploits, worms, and bots from spreading between LAN segments.

Automatically isolate infected systems. When an infection hits, it’s important that your IT security solution be able to quickly identify compromised systems and automatically isolate them until they can be cleaned up (either automatically or through manual intervention).

Use strong passwords for your remote management and file sharing tools that are not easily compromised by brute-force hacking tools.


Segmenting LANs to Minimize Lateral Movement


Unfortunately, many organizations operate with a flat network topology – with all their endpoints connected into a common switch fabric. This topology compromises protection by enabling easy lateral movement or propagation of network attacks within the Local Area Network since the firewall has no visibility or control over the traffic through the switch.

Looking to get best firewall protection? call us now at (520) 841-5200 or contact us by email at accounts@ngx-us.com #Sophos #SophosXG

Compañía

Contactanos 

MX: +52 (800) 943 05 05

USA: +1 (877) 431 80 80

© 2020 Networking Group 10 SA de CV | NGX Tech Solutions, LLC

  • LinkedIn
  • YouTube
  • Facebook
  • 185988