Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Solving Ransomware Presents Opportunity for Security Companies

    Written by

    Robert Lemos
    Published July 16, 2016
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      When ransomware hit the Horry County School District in South Carolina in February, the IT staff’s first warning of the disaster came from teachers who could no longer access their files. Days later, Hollywood Presbyterian Medical Center staff “noticed issues accessing the hospital’s computer network”—the organization’s only warning that it too had become a victim.

      The incidents underscore the fact that many companies and organizations are still unprepared to prevent—or at least, detect—ransomware infections before their data is held hostage by cyber-criminals. While ransomware resembles much of the other malware, its defining feature, the ability to encrypt data, can cause significant damage to business operations, making the detection of such threats imperative. Unfortunately for victims, the time between infection and impact tends to be much shorter with ransomware than for other forms of attack, such as data theft.

      “The point of entry is not any different for ransomware, but the shot clock really starts pretty quickly,” Ed Cabrera, chief cyber-security officer, Trend Micro, told eWEEK. While other breaches revolve around exfiltrating data, which may never be used or which may have limited impact on the company, the payload of ransomware makes it fundamentally different. “Through all the stages of a traditional attack, you have a lot of chances to detect and respond. With ransomware, there are not a lot of steps—there is not a lot of time to react.”

      Little surprise, then, that ransomware has become the security threat of the 2016. In the first quarter of the year, the FBI estimated that more than $209 million had been lost to ransomware attacks, according to a CNN report. And attackers are ramping up their efforts: Trend Micro identified 50 new variants of ransomware in the five months of 2016, up from 49 variants for all of 2015.

      Seeing a market, security companies have added features to current products to allow their clients to better detect and more quickly block ransomware before it can encrypt important data. Illusive Networks, for example, has added ransomware-specific canaries, what it calls “deceptions,” to its product to signal when ransomware is attempting to encrypt files. While it may detect the ransomware after it has infected a system, such an approach can help incident responders shut down the attack before it gets far.

      Focusing on how ransomware interacts with data is a popular approach.

      Data-protection firm Varonis, whose products monitor servers and devices for changes to data as well as strange user behavior, has added specific patterns to its behavioral analytics that can detect the unwanted encryption committed by ransomware attacks. While a simple rule—such as determining that the renaming of 500 files in a minute is a sign of maliciousness—could detect much of today’s ransomware, it would be easy to circumvent in the future, so Varonis has added more in-depth rules, David Gibson, vice president of strategy and market development at Varonis, told eWEEK.

      Solving Ransomware Presents Opportunity for Security Companies

      “That is a basic alert, not really user-behavior analytics,” he said. “We are able to discern that something looks like an automated pattern. That is something that is a bit more future-proof when detecting something that is low and slow.”

      Rather than focus on the data, other companies are focusing on how a user behaves and using analytics to discern whether the actions taken on a computer are a user or a malicious program.

      Exabeam, a company focused on user analytics, has found that a few tweaks to its system can easily pinpoint actions that are likely to be ransomware. The programs, much like other malware, change file names, systematically overwrite files, communicate with malicious domains, and take other actions indicative of an automated, malicious program, Barry Shteiman, director of threat research at Exabeam, told eWEEK.

      “I have tracked 86 variants of ransomware,” he said. “I haven’t seen one where we didn’t see artifacts that were totally new.”

      Host-based security software—the approach into which many traditional antivirus companies have morphed—can still be relevant. Trend Micro, for example, stops 90 percent of ransomware attacks at the email gateway, another 9 percent through URL filtering and malicious Website detection, and less than 1 percent of attacks through behavioral analytics, Trend Micro’s Cabrera said.

      Such a layered approach cannot be avoided, he said. Companies need to focus on better backups, detection of malicious communications and malware activity, and new analytic techniques.

      “Arguably, there is no 100 percent solution,” Trend Micro’s Cabrera said. “In the end, that is why you need to be resilient. As your strategy, you need to protect all your assets, and speed up detection and speed up patching.”

      Overall, companies should treat ransomware as a special case of traditional malware, he said. Improving the speed in which attacks are detected, and blocking the attacks before they have a significant business impact, are both important.

      While some security experts consider ransomware to be a more serious attack than run-of-the-mill malware, Varonis’ Gibson argued that the pain of ransomware is mainly short term. While he would not go so far as to consider such attacks a benefit, companies attacked with the malicious encryption programs are quickly given signs that their systems were vulnerable, which can help them figure out where more insidious attackers might go.

      In the end, other insider threats, which Varonis specifically aims to defend against, can be much more damaging, he said.

      “The one point that people are missing is that ransomware is the gentlest insider threat that there is,” he said. “Ransomware is the only insider threat that you know is there. The other ones are much more stealthy, and you will not catch them before they have completed stealing your data.”

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×