Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access. Ransomware is often designed to spread across a network and target database and file servers, and can thus quickly paralyze an entire organization. It is a growing threat, generating billions of dollars in payments to cybercriminals and inflicting significant damage and expenses for businesses and governmental organizations.
Ransomware uses asymmetric encryption. This is cryptography that uses a pair of keys to encrypt and decrypt a file. The public-private pair of keys is uniquely generated by the attacker for the victim, with the private key to decrypt the files stored on the attacker’s server. The attacker makes the private key available to the victim only after the ransom is paid, though as seen in recent ransomware campaigns, that is not always the case. Without access to the private key, it is nearly impossible to decrypt the files that are being held for ransom.
Many variations of ransomware exist. Often ransomware (and other malware) is distributed using email spam campaigns or through targeted attacks. Malware needs an attack vector to establish its presence on an endpoint. After presence is established, malware stays on the system until its task is accomplished.
After a successful exploit, the threat actor drops and executes a malicious binary on the infected system. This binary then searches and encrypts valuable files, such as Microsoft Word documents, images, databases, and so on. The ransomware may also exploit system and network vulnerabilities to spread to other systems and possibly across entire organizations.
Once files are encrypted, ransomware prompts the user for a ransom to be paid within 24 to 48 hours to decrypt the files, or they will be lost forever. If a data backup is unavailable or those backups were themselves encrypted, the victim is faced with paying the ransom to recover personal files.
Ransomware attacks and their variants are rapidly evolving to counter preventive technologies for several reasons:
Today’s thieves don’t even have to be tech savvy. Ransomware marketplaces have sprouted up online, offering malware strains for any would-be cybercrook and generating extra profit for the malware authors, who often ask for a cut in the ransom proceeds.
Pinpointing the individuals behind ransomware attacks is a significant challenge due to a confluence of factors that shield cybercriminals from detection and prosecution.
Ransomware attackers can be located anywhere in the world. They often operate in regions that lack strong cybercrime laws or do not cooperate closely with international law enforcement. This creates “safe havens” where criminals can act with reduced risk of extradition or legal repercussions.
Cybercriminals rely on technologies designed to conceal their identities, such as the Tor network and other encrypted communication channels. These tools mask the origin of internet traffic, making it difficult to link an online persona to a specific individual or location.
Ransom demands are almost always in cryptocurrency (e.g., Bitcoin, Monero). While not untraceable, these currencies are often laundered through mixers and crypto exchanges with lax regulations. This makes the money trail more difficult—but not impossible—to follow.
Criminals frequently use hosting providers that ignore or fail to enforce takedown requests. These so-called “bulletproof” services allow attackers to hide malicious command-and-control servers or data drop points beyond the reach of law enforcement.
Ransomware groups often have the resources to employ advanced techniques. They may use multi-layered attacks, exploit zero-day vulnerabilities, or conduct extensive recon on targeted networks before deploying malware. This level of technical skill helps them avoid detection and cover their tracks.
Attackers regularly move their infrastructure (servers, domains, and IP addresses), making them a fast-moving target. By the time law enforcement identifies a server or domain, criminals may have already moved operations elsewhere.
Ransomware is sometimes part of a larger organized crime operation. In these scenarios, attackers are well-funded, maintain a supply chain of specialists (developers, negotiators, money launderers), and can replace compromised assets quickly if part of their operation is shut down.
Victims may delay or avoid reporting ransomware attacks out of fear of reputational damage or concern over legal implications (e.g., data privacy regulations). This limited visibility reduces the amount of evidence available to investigators.
Ransomware-as-a-service is a cybercrime economic model that allows malware developers to earn money for their creations without the need to distribute their threats. Other criminals buy their wares and launch the infections, while paying the developers a percentage of their take. The developers run relatively few risks, and their customers do most of the work. Some instances of ransomware-as-a-service use subscriptions while others require registration to gain access to the ransomware.
Ransomware attacks pose a multitude of risks and complex challenges businesses face when targeted and extorted:
Data encryption and loss
Ransomware encrypts critical data, making it inaccessible without the decryption key, which attackers often only provide after receiving payment. Even if you pay the ransom, there's no guarantee that you'll fully recover your data, and some might be permanently lost.
Double extortion
Many ransomware attacks now involve stealing sensitive data before encrypting it. Attackers then threaten to release the stolen data if the ransom isn't paid, increasing pressure on victims.
Business disruption
Ransomware attacks can cripple operations by preventing access to critical systems and data, leading to lost productivity and potential customer dissatisfaction.
Reputational damage
Public disclosure of a ransomware attack can significantly harm a company's image, especially if sensitive customer data is leaked.
Legal and regulatory implications
Depending on the type of data compromised in a ransomware attack, companies may face legal consequences and regulatory penalties for data breaches.
To avoid ransomware and mitigate damage if you are attacked, follow these tips:
Educate & Train Employees: Employees are the first line of defense against ransomware. Stress the importance of strong cyber hygiene and vigilance in spotting potential threats. Implement rigorous training programs to educate employees to recognize phishing attempts and suspicious emails, and promote safe online behavior while discouraging risky actions.
Implement a Zero-Trust Strategy: Adopting a zero-trust approach to security means trusting no one by default. Verification and continuous authentication are essential components of this strategy, and micro-segmentation can help isolate critical assets from potential threats.
Enhance Email Security: Email is the primary vector for initial access in ransomware attacks. To enhance email security, deploy email filtering and anti-phishing measures. Regularly train employees on email security best practices to ensure they can identify and respond to threats effectively.
Maintain Offline Backups: Ensure data recovery in case of a ransomware attack by regularly backing up critical data. Keep these backups offline and isolated to prevent them from being compromised. Regularly test data restoration procedures to ensure they work as intended.
Create an Incident Response Plan: Being prepared to respond swiftly and effectively to a ransomware incident is crucial. Develop a clear incident response plan that outlines roles and responsibilities. Regularly update and test the plan to ensure it functions as intended in a crisis.
Fortify Your Endpoints with EDR (Endpoint Detection and Response): Protect your devices and networks with advanced endpoint security. Implement real-time monitoring and response capabilities, utilize behavior-based threat detection, and be prepared to isolate infected devices to prevent lateral movement within your network.
Keep Systems Up-to-date and Patch Known Vulnerabilities: Regularly update your software and systems to stay ahead of attackers. Apply patches promptly to fix known security vulnerabilities, and conduct vulnerability scanning and assessment regularly to identify and address potential weaknesses.
The following trends are commonly seen by our frontline incident response experts when investigating and remediating ransomware.
The median dwell time for ransomware attacks is 72.75 days, in comparison to all threats at 56 days (including ransomware).
Days of the week highlighted above represent when deployment and execution of the ransomware attack begins, not when the attacker gains initial access.
Focus on attacker behavior to reduce the average dwell time of a strategic ransomware actor
from 72 days to only 24 hours or less.
If you suspect you’ve been hit with a ransomware attack, it’s important to act quickly. Fortunately, there are several steps you can take to give you the best possible chance of minimizing damage and quickly returning to business as usual.
When faced with the possibility of weeks or months of recovery, it might be tempting to give in to a ransom demand. But there are several reasons why this is a bad idea:
Trellix provides critical coverage for all stages of a sophisticated ransomware campaign — from reconnaissance to recovery — offering unmatched visibility and reduced time to detection and response.
With Trellix, you can minimize the mean time to detect (MTTD) and respond (MTTR) to ransomware threats. The Trellix Security Platform offers AI-powered speed, reducing cost and increasing SOC analysts’ productivity with automatic prioritization, guided response, rollback actions, and ready-to-use playbooks.
Trellix’s Advanced Research Center analyzed more than 9,000 real-world ransomware attacks to develop a kill chain model that helps combat ransomware and reduce time to value, cost, complexity, and overall risk. Leverage rich threat intelligence from Trellix’s Advanced Research Center to decrease false positives and ensure your SOC spends time fighting attackers instead of chasing alerts.
The AI-powered Trellix Security platform, provides comprehensive native controls, offering a one-platform, best-of-breed tool to replace five or more point products. The open platform integrates over 1,000 third-party data sources, providing quick time to value with more than 500 out-of-the-box integrations.