Over the past year, the global pandemic has taught the cybersecurity industry a lot about the spread of infection–how to control it, how to mitigate against it, and (sometimes) how to detect it. But more often than not, in both humans and cybersecurity, detection only happens because of indicators.
What remains a mystery and consequently a great challenge for medical professionals and cybersecurity teams alike is how to detect infection among asymptomatic humans and devices. Let’s imagine that through some backdoor or even through a phishing attack, ransomware gains access into a network. What’s widely believed about ransomware is that once a device is infected, its files are locked up, encrypted until the ransom is paid. So, how does ransomware go undetected for months or even years before being activated? Well, defenders have to start thinking of some ransomware as doctors do the asymptomatic.
Arguably, it’s the asymptomatic that have caused the greatest pain points when it comes to containing the spread of the virus. People feel fine, thus they go about their days taking fewer precautions. Unbeknownst to them and their unsuspecting victims, the asymptomatic are actually spreading the virus. Sure, if they were tested, they’d have confirmation of their status, but why would someone with no symptoms be tested in the first place? The same is true with corporate supply chains. Like unsuspecting patients, they have no symptoms at all. This puts every one of their business connections at risk of infection.
Security teams need to recognize that many ransomware victims are asymptomatic. At Prevailion, we routinely detect active corporate compromises by ransomware that have remained in stealth mode over a period of weeks or months.
Because most people assume that encryption follows immediately after a ransomware infection, they don’t suspect that they’ve been exposed to a ransomware attack. They’ve been hit, but with a non-encrypting ransomware attack. That’s why dormant ransomware on a network poses major security challenges.
Just as a person can contract COVID but display no symptoms, the reality is encryption post attack doesn’t always happen for a variety of reasons. For instance, ransomware often serves as a dual-purpose weapon, such as backdooring networks or harvesting information. Attackers also commonly wait to deploy the encryption stage of the malware attack until they have been able to spread the infection as far as possible across the network. Certain types of ransomware, like Locker, are deliberately stealthy. And in some cases, like UNC1878, the hackers simply compromise more targets than they can handle, and as a result, the ransomware remains in place, but in a dormant state – waiting to be activated at some future date. Regardless of the reason, when there is no sign of an incident, there is no response, no quarantining of infected devices, no forensics, no discovery.
That’s logical, but dangerous. Imagine the already overwhelmed security team drowning in noise. They are simply trying to winnow out the positives in a sea of false alerts. Yet, with some ransomware, there may not be much indication of an attack. Why would an unknowing victim take precautions to stop the spread?
Stopping the virus in its tracks, though, is the only way to prevent the ransomware from gaining access to as many machines as it can get to. That can’t be done on a whim. Detecting asymptomatic attacks requires the real-time visibility delivered on our platform so that organizations can detect even the most deliberately stealthy ransomware that lies in wait until it has access to as many machines as it can.
A member of the FCC renewed urgency calls on Apple and Google to remove TikTok from their app stores, raising concerns that TikTok’s Chinese-based parent company is collecting user data that is being accessed in China.
What Wicked Webs We Un-weave: Wizard Spider once again proving it isn’t you, it isn’t me; we search for things that you can’t see Authored by: Matt Stafford and Sherman Smith Executive summary: In late January 2022, Prevailion’s Adversarial Counterintelligence Team (PACT) identified extensive phishing activity designed to harvest credentials for Naver. Naver is a […]