Perpetrators of CWT ransomware attack recommend password rotation, admin rights removal, and application control as tips to prevent attacks.
Even in movies, we don’t get to see burglars giving tips on how to protect our homes. In the cybersecurity world, the modus operandi and the measures to prevent attacks mostly revolve around assumptions. Last week, in a rare happening, Jack Stubbs, the European cybersecurity correspondent at Reuters has published the online chat room negotiations that reportedly took place between a victim of a ransomware attack and the attack perpetrators.
The best part of the story is the tips given by the attackers to prevent attacks after the ransom was paid. The tips lay stress on passwords protection, locking down administrator rights, and establishing application control - which security experts have long been recommending.
Last week, CWT, the US-based business travel management firm faced a ransomware attack. Cybercriminals stole reams of sensitive corporate files and claimed they had knocked 30,000 computers offline. The attackers used a strain of ransomware called Ragnar Locker, which encrypts computer files and renders them unusable until the victim pays for access to be restored. The firm reportedly paid $4.5 million to the hackers.
Reuters got access to a public chat room conversation reportedly between the CWT representative and the hacker group. At the end of the negotiations, after the ransom was paid, the hackers have given a set of security recommendations to prevent future attacks.
The cybercriminals have given a list of recommendations to prevent ransomware attacks. Some of the key recommendations include:
The above recommendations clearly bring out the importance of the foundational security measures that security experts have been stressing for so long.
Malware quickly and easily spreads through the installation of unapproved software, pirated tools, opening malicious email attachments, clicking malicious URLs, visiting harmful pages (drive-by downloads), and so on. Even tech-savvy end-users can unintentionally fall prey to any of these attacks and malware would gain a strong foothold.
Most of these attacks happen mainly because end-users possess local administrator rights. When your employees work from home, quite unintentionally, they tend to do all these.
After getting on to a computer, the malware goes about editing the registry gaining a strong foothold, captures credentials, tampers audit logs, and moves laterally across the network stealing sensitive data.
Organizations should have control over what applications their end-users are installing on corporate laptops while working remotely. Preventing the usage of unauthorized applications reduces the risk of Malware.
The best practice approach to prevent attacks is to enforce least privileges across the organization by removing local administrator rights from all endpoints. But this could lead to productivity issues and frustration as employees will have to approach the system administration team even for trivial needs.
To avoid that, administrator rights removal should be combined with robust application control. Define and control which applications can be run by standard users. Whitelist trusted applications and prevent unapproved and malicious applications. This empowers standard users to seamlessly run approved applications (that would normally require admin rights) whenever needed. When specific users require broader privilege, you can grant a time-limited, fully controlled, and comprehensively audited temporary administrator access on a need basis. This is controlled by a well-defined workflow, which takes care of automatically revoking the access.
Another best practice measure, which is often overlooked is periodic password resets. If the passwords of sensitive IT assets are changed periodically and assigned with strong, unique passwords, the risk of cyber attacks could be reduced.
Securden helps you thwart security issues with an extremely easy-to-use, simple to deploy, and a highly affordable privileged access security solutions.
Schedule a demo or start a 30-day trial now.
Florida Water Treatment Plant Hack: A Wake-Up Call to Strengthen Basic Security Measures, Password Hygiene
One of the worst fears of humanity came true last week. Ever since cyberattacks started increasing in variety affecting organizations...
Feb 13 · 4 min read
Remote work, pirated software, and local admin rights: A deadly cocktail
Endpoints are increasingly becoming an entry point for malware. It has been a common practice to grant local admin privileges to the end users on their ...
Dec 08 · 3 min read
Securden vs. Competitors: A Story of Point-and-Click Simplicity vs. Complex, Illusory Superiority
The story of how a large government agency eliminated admin privileges on endpoints and implemented on-demand application elevation using ...
Oct 29 · 3 min read
Passwords and their management: A tale of two decades
Last week, I came across an interesting research on cybersecurity practices during the past decade (2010-20) by Jean-Christophe Gaillard, a UK-based cybersecurity strategist...
Oct 09 · 4 min read
Windows Server Privilege Escalation: Security Issues and Best Practices
One of the most difficult aspects of security in a Windows environment is keeping visibility to and control over Windows privileges. This post analyzes Windows Server...
Brandon Lee · Senior Writer
Aug 24 · 4 min read
A hacker’s prescription to prevent ransomware attacks
Perpetrators of CWT ransomware attack recommend password rotation, admin rights removal, and application control as tips to prevent attacks...
Aug 03 · 5 min read
Application Password Managment Using APIs
There is arguably not a more important topic in the technology world today than security. Security can no longer be an afterthought for organizations serious...
Brandon Lee · Senior Writer
July 15 · 5 min read