Prevent ransomware by stopping lateral movement: the case for active defense

Cybercrime is often motivated by profit, and threat actors have realized that the most profitable way to conduct their business is to target enterprises with deep wallets, a cyber insurance policy, and/or valuable assets. However, these attacks are not as easy to pull off as it is to send out a generic phishing email and hope for the best – they require a lot of resources and careful planning.  The “hack for ransom” threat is spreading rapidly and, in many cases, paying handsomely.   These professional cyber attack groups are targeting companies, hospitals, schools, government organizations, and critical infrastructure providers.  The streak of successful ransomware attacks that has populated recent headlines is proof that the tactics are paying off.  We are on the verge of a global digital pandemic that accelerates the exposure to harm or loss resulting from these attacks.   

To further complicate the matter, the software supply chain is long and perilous. As the recent SolarWinds incident has demonstrated, despite years of security specialists advocating for vulnerability scanning and tempestive patching policies, it is extremely hard to stop attacks that come through the supply chain. Vulnerabilities might be known and remediable, but the sheer number of stages at which something might go wrong makes it almost impossible to reduce risk to an acceptable level, especially when it comes to attacks as sophisticated as the one that hit SolarWinds. In that instance, threat actors focused on obtaining credentials and slowly crept into the network, moving laterally and progressively gaining access to systems and data. This is the same tactic used in today’s enterprise ransomware attacks.

Source link