Simon Edwards, CEO of SE Labs, says businesses should stop thinking that ransomware is somehow different from any other attack. Hackers’ playbooks haven’t changed much over the years. Getting access, escalating privileges, stealing or destroying information through reconnaissance are their primary goals. It’s a plus if they can establish persistent access simultaneously. Attackers don’t use magic. The use of tried and true hacking techniques is indeed ruling the day. “
Many people believe that hacking entails top-secret programs and arcane knowledge held by a selected group of mysterious computer nerds. However, with a few readily available books, some free software, and access to YouTube, you can set yourself up as a pretty capable attacker, “says Edwards.”
Ransomware is just the “steal or destroy” stage of an attack, in which an attacker launches a program that encrypts the data of the victim. Everything up to that point has been a standard attack, whether the goal is to launch a ransomware campaign, covertly spy on a company, or utilize the hacked machine as a stepping stone to another network.
While this may appear to be terrible news, defenders benefit from the attacker’s often straightforward and predictable tactics. In many cases, security providers defend against ransomware using tried-and-true detection and protection approaches because they work.
Rather than focusing on a single issue, such as ransomware, businesses should ensure that their own infrastructures are secure enough to prevent any form of attack, regardless of payload, from being launched. Regularly ensuring that security procedures and policies continue to meet the needs of the business can aid in fortifying defenses.