Palo Alto Networks Blog 2024年10月03日
Using Time in Your Favor During a Ransomware Attack
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

文章探讨了面对勒索软件攻击时的应对策略,包括预防攻击、减缓攻击者节奏、在谈判中争取时间、注重恢复工作等方面,以降低损害并提高成功解决的机会。

🛡️预防攻击是减轻勒索软件攻击损害的最佳方式,但无法完全阻止,因此需有应对策略。帮助数百个组织后发现,争取时间可改变力量平衡,更有利于解决问题。

💬在与攻击者谈判时,可采用多种策略拖延时间,如表示愿意付款但需时间准备、协商降低赎金、询问攻击细节、故意装糊涂等,为团队争取应对时间。

📈恢复工作包括隔离漏洞、修复漏洞并恢复系统、持续监控评估系统等。同时,在攻击者关注付款时,团队应了解数据是否被盗等情况,为可能的报告做准备。

🎯利用谈判阶段争取优势,与攻击者沟通以掌控局面,有效执行应急计划,收集信息并专注于恢复,还可提前配备可靠的应急响应伙伴。

Slow-Playing the Attackers

When you face extortion, there are battle-tested strategies to put the attackers on their back foot and give your team time to get ahead. The best way to mitigate a ransomware attack is by preventing it outright. But, you can’t stop everything, so having robust strategies to handle an active incident minimizes the damage and recovery time.

Ransomware attacks are urgent for both sides. Organizations must quickly respond, recover and mitigate the damage while attackers need a swift payoff to move on to their next target.

But, it’s not all about speeding up. Slowing attackers down is just as important.

After helping hundreds of organizations overcome ransomware attacks, we’ve learned that buying time can change the balance of power and set you up for a more successful resolution.

Stall During Negotiations

Ransomware attackers run businesses. They have English-speaking customer service representatives ready to facilitate payments. Their strategy is to pressure you to pay quickly to regain access to your data.

They also have an incentive to uphold their reputation. If they don't deliver on their promise to restore access after payment, word will spread, and potential victims will be less likely to pay them in the future.

Our Incident Response (IR) Report showed that attackers tend to keep their promises when paid 67% of the time. While, 20.6% of attackers don't keep their promises at all, 7.8% of cases were unknown, and 3.9% partially fulfilled their promises.

It’s worth engaging in communication with attackers, but not on the off-chance they will keep their promises. Instead, use the opportunity to buy your team crucial time to respond to the attack.

Negotiations are high-stakes. If you’re in a high-pressure situation, call us.

During negotiations, several strategies can be employed to stall and gain valuable time:

    Indicate willingness to pay but need more time – One effective stalling tactic is to indicate that you are willing to pay but need time to collect the necessary resources and gain executive approval. This not only buys you time but also keeps the attackers engaged and less suspicious.Negotiate a lesser ransom – Tell the attackers that you cannot afford the amount they are asking. This can lead to extended discussions that delay the process and grant more time to focus on recovery.Ask questions about the compromise – Use the negotiation period to ask questions that might reveal details about the compromise. Understanding the scope and specifics of the attack can be critical for your investigative and recovery efforts. Questions also stall the attackers as they take time to respond.Play dumb – Act confused and be confusing in your responses, which force the attacker to engage with you continuously to clarify their intent and demands. By creating a back-and-forth exchange, you can significantly prolong the negotiation process.

Employing these stalling techniques can buy you the essential time needed to respond effectively. It's best to focus on recovery efforts, determine whether sensitive information has been stolen, and glean whatever information you can from the attackers.

Remember, the goal is to use every available advantage to mitigate the impact of the attack and improve your chances of a successful recovery.

Focus on Recovery While Attackers Focus on Payment

Recovering while being pressured into paying a ransom involves a multifaceted approach to help your organization bounce back as quickly and safely as possible.

Isolating the Breach

First, isolate the compromise. Identify which systems have been compromised and how the attackers gained their foothold.

Tools like Cortex XDR can be invaluable in helping you to investigate the breach and answer critical questions about the attack vectors and extent of the compromise. Additionally, this tool provides a comprehensive overview of your environment, enabling you to investigate the source of the attack and take appropriate action to contain it.

Remediation and Restoration

Next, focus on remediating vulnerabilities. Patch systems and revoke any account privileges that could potentially have enabled the compromise.

Addressing these vulnerabilities prevents further exploitation. Make sure your patch management processes are comprehensive and that all systems are up to date with the latest security fixes.

Rely on your disaster recovery strategy and use offline backups for the recovery process. Restore your systems carefully, verifying that the backup data is untampered and functional.

The recovery phase requires continuous monitoring and assessment of your systems. Keep an eye out for any signs of residual compromise or further malicious activity.

Post-Attack Preparation

Slow playing the attackers gives teams (others than your emergency responders) time:

By concentrating on recovery while engaging in stalling tactics with the attackers, you'll manage the scope and depth of damage caused.

Make Time Your Ally

Even as attacks become more rapid and sophisticated, using the negotiation stage to your advantage can put the ball back in your court.

If a ransomware attack happens, commit to communicating with the attackers as a means to take control of the situation. Slow-playing them lets you execute your incident response plan effectively, gather valuable information, and focus on recovery.

If you're interested in preparing your defenses in advance, equip your organization with a trusted incident response partner like Unit 42, and be ready for any scenario.

The post Using Time in Your Favor During a Ransomware Attack appeared first on Palo Alto Networks Blog.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

勒索软件攻击 应对策略 谈判拖延 恢复工作 掌控局面
相关文章