Ransomware Removal and Recovery – What’s Your Plan?
It’s inevitable that ransomware like NotPetya and WannaCry will infect your corporate endpoints. Sure, there are precautions you can take to prevent infection, but it’s often a result of a mistake or errant click by a trusted user. And developers of ransomware and malware are always finding new ways to trick people into allowing entry. It’s hard to predict how they’ll seize and hold for ransom your sensitive data, and it’s hard to keep up with their technology.
Training staff and IT to identify likely entry points for malware is important, it’s more important to prepare for your recovery after an endpoint is hijacked. Do you know what to do if you or others at your company see the infamous “pay to recover your data” screen?
What is Ransomware?
It’s malicious software that carries out a crypto-viral extortion attack. In other words, it takes the data stored in a computer hostage and demands a ransom to unlock it. Ransomware usually makes it way onto a computer via unsecured email attachments or other shared files – a user receives an attachment, downloads it without knowing what it is, and the ransomware is secretly installed on the machine. Then, the controller of the Ransomware can trigger it to carry out its malicious purpose.
How can you prevent a ransomware virus from seizing your data?
Easy ways to help prevent a ransomware attack:
- Patch your computers to stop Server Message Block (SMB) exploits.
- Disable SMBv1 on every endpoint for good measure
- If you’re not using a network overlay platform like Vaultize, block outside access to SMB
-associated ports 137, 138, 139 and 445 to prevent unwanted traffic through your firewall.
- Ensure Windows 10's Credentials Guard is working properly on all endpoints, as it thwarts password extractors in NotPetya and other malware.
- Create a read-only file C:\Windows\perfc.dat, which can thwart the file-scrambling of NotPetya and other ransomware versions. This won’t stop them from spreading across your network, though.
- Unless it’s critical, don’t immediately download and install updates to widely-used programs on your network that might have domain admin access or on endpoints with domain admin access. Wait to see if others report issues.
- Carefully examine your network structure. Is it “flat”? Do network administrators have carte blanche, and can they access and control other endpoints from theirs? If so, change your structure so that, if their machine is infected, ransomware can’t sniff out credentials and take control of other endpoints in order to spread.
Your first reaction shouldn’t be to pay the hacker’s ransom. You could wait for a decryption key if you have access to a service that can provide one, but there’s no guarantee that you’ll get one that works. Your best course is to reset infected endpoints back to safe versions, but what about all the important data stored on their hard drives? Just rewinding a computer to a point before infection will also permanently delete tons of your important documents and files That’s why endpoint backup is a critical, if not the most important, facet of a recovery strategy. By continuously backing up versions of your endpoint devices, you’ll maintain a complete library of restore points you can roll back to if your data is hijacked or compromised. If you don’t haven’t backed up the endpoint’s C: drive but you’re still able to access your data: Odds are very slim that you’ll be able to recover your data without endpoint backup. Meanwhile, identify other endpoints that could be infected by running a full virus scan on all machines (if they’re not already showing the “pay up or lose your data” screen). It’s prudent to roll back all endpoints to versions that predate the introduction of ransomware to the known infected system.What should you do after ransomware?
If you do have endpoint backup:
If you don’t have endpoint backup:
Schedule a demo
Additional Ransomware Help
The best defense against Ransomware attacks is a comprehensive endpoint backup and restore program. By regularly backing up data on endpoint devices - laptops, mobile devices, workstations - you'll ensure that there will be a clean copy of a system to roll back to if a device is compromised.
Vaultize provides a full-featured endpoint data backup, restore and protection solution through policy-based endpoint backup, endpoint encryption and remote wiping. Vaultize also goes much beyond a plain laptop/desktop backup. It is designed as a scalable cloud-architected enterprise file security platform features: