• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • KeepSolid SmartDNS: Lifetime Subscription for $59

    KeepSolid SmartDNS: Lifetime Subscription for $59
  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $89

    VPN Unlimited: Lifetime Subscription for $89
  • Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399

    Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399
  • Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

    Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Ransomware Taxonomy: Four Scenarios Companies Should Safeguard Against

Oct 15, 2021 by iHash Leave a Comment


While October is designated as Cybersecurity Awareness Month, focusing on keeping your company and customers safe should be a constant priority, especially with the growing number and sophistication of ransomware attacks worldwide. As companies interact more digitally with customers and end-users, their attack surface increases, presenting more opportunities for would-be attackers.

We’ve spent a lot of time studying ransomware attacks and instead of viewing them as an amorphous threat, have looked for distinct scenarios that can be identified and mitigated. These efforts have resulted in a taxonomy to identify four specific scenarios companies should be aware of to defend themselves:

1) An attack against a company’s corporate data and back-office services to disrupt their operations. 

This is the classic attack scenario that comes to mind for most folks when you hear the word “ransomware.” For some environments, this can unfold as easily as a compromised username and password being used to infiltrate a virtual private network (VPN) to access network resources. Once a bad actor is inside, they can take control of a company’s IT infrastructure. By locking out internal users from their laptops and servers they require access to do their jobs, this type of attack can immediately shut down the ability to operate the business.

The security technical debt in the IT environment is the key focus for remediation to limit the impact of this type of attack. By deploying basic tools such as multi-factor authentication (MFA) to verify user credentials, companies can avoid these disruptive and expensive ransomware attacks. A few suggestions for companies to consider:

  • Deploy a Zero Trust architecture to reduce the attack surface and continually add security applications, devices, and capabilities to prevent intruders from accessing their network resources.
  • Launch defense-focused initiatives focused on areas like identity management and governance, security monitoring and intelligence (to detect and alert for unusual account activity), credential management, and asset quarantine solutions.

2) An attack against a company’s engineering organization to disrupt service delivery to its customers.

Some attackers may target the servers and infrastructure that underpin a company’s service delivery to customers. In many organizations, engineering or tech ops maintain software-as-a-service as a distinct environment separate from corporate IT. Bad actors may seek to interrupt critical service delivery such as website functionality, online customer support, and customer-facing applications.

An organization that is squarely focused on the first scenario targeting corporate IT might have significant gaps lurking in the engineering environment underpinning service delivery to customers. Engineering teams can also speak a different language from the folks in IT, so organizations should tailor their risk discovery and remediation efforts for each environment that must be protected.

  • Leverage XaaS capabilities via the cloud and managed services versus on-premises infrastructure, allowing greater threat detection and vulnerability management.
  • Develop and deliver centralized security functions and services via an Operational Security Stack to ensure consistent adoption and adherence.
  • Proactively assess and address security risks and identify required risk mitigation via a secure development lifecycle approach.

3) An attack against a company’s engineering infrastructure to leverage that infrastructure in a supply chain attack to distribute ransomware against other companies.

In these types of sophisticated attacks, threat actors will compromise a company’s product engineering build and release infrastructure to gain access and distribute trojan updates to the downstream users of their software.

These software supply-chain attacks are particularly appealing for attackers because they take advantage of the trusted relationship between customers and vendors regarding the integrity of the distributed software.

We recommend a trust but verify approach when it comes to your vendor’s value chain security and to consider threat modeling from both an outside-in and inside-out perspective. Here are some ideas to make your architecture infrastructure more resilient against supply chain attacks:

  • Implement baseline security controls in all build server environments, including embedded, application, and cloud.
  • Design and align to consistent, secure core reference architectures easily managed and scaled to meet business requirements.
  • Leverage penetration testing and security assessments to ensure all production environments are secured and hardened.

4) Attacks leveraging product vulnerabilities in on-premise software hosted and operated by a customer to distribute a ransomware attack against that customer.

In this scenario, an attacker targets an installed version of commercial software to act as a point of distribution for a ransomware attack throughout the victim organization. This might be achieved through product vulnerabilities or leveraging stolen credentials.

Based on our analysis and identifying similar characteristics of other ransomware targets, we recommend the following steps to mitigate product risk:

  • Establish a process for continuous evaluation of company products, risk posture, and state of controls by working with stakeholder teams to prioritize risk mitigation and close critical security gaps.
  • Establish and maintain tight internal and external product security awareness and reporting that is consistently monitored and inspected.
  • Ensure transparent customer notification and clear communication pathways to maintain trust and demonstrate accountability when addressing security vulnerabilities.

While the pace of the digital economy continues to drive business growth and rapid innovation, it is also fueling an unprecedented level of cyber threat globally. Each of these ransomware scenarios presents the opportunity to improve your defenses by taking a proactive and zero trust approach to threat detection, mitigation, and response. Stay safe!


We’d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Secure on social!

Cisco Secure Social Channels

Instagram
Facebook
Twitter
LinkedIn

Share:





Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: Companies, ransomware, Safeguard, Scenarios, Taxonomy

Special Offers

  • KeepSolid SmartDNS: Lifetime Subscription for $59

    KeepSolid SmartDNS: Lifetime Subscription for $59
  • Passwarden PW Manager Lifetime Subscription for $79

    Passwarden PW Manager Lifetime Subscription for $79
  • VPN Unlimited: Lifetime Subscription for $89

    VPN Unlimited: Lifetime Subscription for $89
  • Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399

    Dell Latitude 5401 14" Laptop i5-9400H 2.5GHz 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $399
  • Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

    Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Dotan Horovits

From Spotify to Open Source: The Backstory of Backstage

Jun 5, 2023 By iHash

Heard on the Street – 6/5/2023

Jun 5, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

KeepSolid SmartDNS: Lifetime Subscription for $59

Expires June 05, 2024 23:59 PST Buy now and get 70% off KEY FEATURES Seamless streaming made possible! SmartDNS is a solution to bypass geo-restrictions and access regionally blocked content on various streaming platforms and video services. By redirecting DNS queries through their SmartDNS servers, users can unlock access to content that is typically unavailable […]

Passwarden PW Manager Lifetime Subscription for $79

Expires June 04, 2024 23:59 PST Buy now and get 60% off KEY FEATURES Safe password manager for those who value security! Passwarden is a secure password manager that simplifies and strengthens your digital life by securely storing and managing all your passwords in one place. It utilizes strong AES-256 encryption algorithms to protect your […]

VPN Unlimited: Lifetime Subscription for $89

Expires June 04, 2024 23:59 PST Buy now and get 55% off KEY FEATURES VPN Unlimited is the ultimate solution for enhancing your online security and privacy. With top-notch encryption algorithms and over 3000 secure servers in 80+ locations worldwide, it effectively masks your IP address and protects your sensitive information from prying eyes. Whether […]

Dell OptiPlex 7060 Micro Desktop Core i7-8700T 16GB RAM 512GB SSD Windows 10 Pro (Refurbished) for $369

Expires May 05, 2123 18:30 PST Buy now and get 19% off KEY FEATURES The Dell Optiplex 7060 Micro Desktop is a solid workstation that is suitable for both home and business computing. it’s powered by Intel Core i7-8700T (8th Generation) with 2.4 GHz processor speed, making every task a breeze. It also comes with […]

Anker 313 Power Bank (PowerCore 10K) for $27

Expires May 30, 2123 05:12 PST Buy now and get 0% off PRODUCT SPECS Quality Throughout:Built adventure-tier touch with superior durability and scratch resistance, Anker 313 Power Bank (PowerCore 10K) is premium both inside and out. Slim Size, Big Power:One of the slimmest and lightest 10,000mAh portable chargers on the market. Provides 2.25 charges for […]

Secrets to successful engineering leadership from Elastic’s Simona Posea

Secrets to successful engineering leadership from Elastic’s Simona Posea

For Simona Posea, visualizing a career in technology came easily. “My mother was a role model, as she’s been working with computers since punch cards were a thing,” Simona laughs. “We had our first PC when I was six years old, and she taught us how to operate it. At the time, I would use […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT