Combatting Ransomware

 

Combatting Ransomware

This guide provides comprehensive information on ransomware mitigation strategies, incorporating activities from the National Institute of Standards & Technology (NIST) Cybersecurity Framework (CSF) and NIST SP 800-53. It is designed to help organizations enhance their cybersecurity posture and effectively combat ransomware threats.

The information presented here is based on recommendations from the Multi-State Information Sharing & Analysis Center® (MS-ISAC®) Metrics Working Group, which advises the federally funded Nationwide Cybersecurity Review (NCSR) assessment program.

Understanding Ransomware

What Is Ransomware?

Ransomware is a type of malicious software (malware) that restricts access to a computer system or files typically through encryption. The attacker then demands a ransom payment to restore access. This can result in significant productivity loss, financial damage, and reputational harm to an organization.

How Does Ransomware Spread?

Common vectors for ransomware include:

Email (Phishing)

  • Users clicking on malicious links or attachments in spam emails
  • Users divulging personal information through deceptive emails

Compromised Passwords/Credentials

  • Weak passwords
  • Compromised user authentication
  • Credential abuse

Vulnerabilities

  • Unpatched software or systems
  • “Drive-By downloading” or malicious apps from app stores

Remote Desktop Protocol (RDP)

  • Unsecured remote access points

Review our guide to learn how to prevent, prepare for, and respond to a ransomware attack.