UPDATE Post: 29/12/2021
In 2021 we have seen a higher increase in ransomware attacks, where companies are faced with their systems and data becoming encrypted and forcing them to pay a ransom to get access back to their data.
Seeing an increased number of organizations targeted daily. You can monitor much of the activity just by watching these Twitter profiles
In a survey that Sophos did where they spoke with 5,400 IT decision-makers in 2021 about 37% were hit by ransomware in the last year. Here in Norway alone a lot of large organizations were hit by Ransomware in 2021, including Nordic Choice Hotels.
In 2020 we also saw that there have been some targeted attacks against Norwegian Parliament as well https://www.zdnet.com/article/norwegian-parliament-discloses-cyber-attack-on-internal-email-system/ while we don’t know how the attackers gained access, we know some of the gateways such as Office 365, ADFS, BIG-IP is in use there.
And even in Finland now where an attacker gained access to an Eletronic Patient record (EPR) where they are holding Psychotherapy Data Ransom. where the data contained 40,000 therapy patients, where the attackers were demanding €200 from each patient. The EPR system was running an outdated version of Ubuntu 16.04.1, Apache 2.4.18 (Which came out in 2015), and PHP 5.6.40, which all contain many known vulnerabilities.
Now with the uprise in ransomware attacks, the attacks are now becoming more efficient and automated as well. Where attacks that before used to take many days now only take hours to complete from a compromised endpoint to full control of infrastructure.
This gives a deeper understanding of how they operate and what kind of tooling is used to gain access. Where the attackers in four hours and 10 minutes in, the threat actors used the access from the primary domain controller to RDP into the Backup Server. This is also a similar pattern that Microsoft described in their Digital Defender Report from October 2021 https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RWMFIi?id=101738
Now looking at the attack patterns the different threat actors are using, it is a mix of the different examples described underneath here. This just highlights some of the ways that attackers can get access to an environment.
However, the attackers are also now changing tactics and going from where they just encrypted data to now extracting data and holding the data outside of customer infrastructure to ensure that the ransom is paid. Then holding a reverse auction to allow the customer to get access to the data again. This means that protection of data and “assume breach” are more important than ever.
Lastly, we also see more DDoS-based attacks and with the introduction of new protocols such as QUIC which is aimed at providing a faster browsing experience will also put more businesses at risk of DDoS based ransomware attacks, which we have also seen increased attacks happening.
We have also seen ransomware attacks utilizing weaknesses in protocols such as DTLS to perform reverse DDoS attacks as well.
So, what common attack vectors are used to distribute Ransomware?
1: Exploiting known vulnerabilities to get access to the corporate network, such as exploiting vulnerabilities in remote access services (Looking at the vulnerabilities that have been with Pulse VPN, F5, Citrix NetScaler, Fortinet) and such it is a pretty extensive list. If attacks were able to utilize one of these, they could get access to the inside of the corporate network. Also, many of these providers also provide load balancing services and such, and therefore be easy for attackers to manipulate load balancing services and expose them directly to the internet. Or that you have systems that are accessible from the internet directly such as RDP or exposed web services running an outdated version of a web engine or OS.
We have the last couple of weeks seen how a weakness in an Apache module can affect thousands of applications. Even with Print Nightmare which has been weaponized for ransomware attacks as well.
NIST has also said that in 2021 we saw a record year for vulnerabilities. (NIST NVD Analysis – Record Vulnerabilities in 2021 | Redscan)
Here you can also view a list of the most common exploited vulnerabilities in 2021 –> Researchers compile list of vulnerabilities abused by ransomware gangs (bleepingcomputer.com)
2: Access through credential stuffing. This is where attackers are leveraging legitimate accounts to get access to the corporate network. This happens because user account information has been hacked, for instance if a user has used the same username and password for other 3. party websites and those sites get hacked. As an example of this, last week Norway Parliament was hacked through E-mail. How the attackers’ got access is still not known but looking at some of the representatives on the Norwegian Parliament on haveibeenpwnd.com showed that they like to reuse their account information for the other three. party websites as well.
3: Access through brute-force attacks. What we have also seen from others is that attackers are performing password spray attacks, which are either going against Office 365 directly where they try to authenticate using legacy protocols which does not have the same protection mechanisms as the other authentication options in M365. Then a user login log might look something like this.
Microsoft is, fortunately, removing support for Legacy authentication protocols which will also limit the ability to do these password spray attacks. A Similar attack vector to do password spray attacks can also be done against ADFS (Active Directory Federation Services) and especially if you are running an older version of ADFS such as 2012. With the newer additions of ADFS you have new features such as integration with Azure MFA.
However, we have also seen that attackers are now using a weakness in the Seamless SSO mechanism as well where they can bypass any Conditional Access mechanisms to do brute force attacks.
4: Access through compromised workstation or end-user machine. This can happen through a phishing email where the attackers lure a user to visit a website and download a payload or through an attachment in an email. This can be through an email from a spoofed domain to appear to be an email from a colleague or a legitimate business. Also, when looking at phishing as the data shows, most kits have a short life, and the window of opportunity for most phishing kits is growing smaller. In fact, over a 60-day period, Akamai observed more than 2,064,053,300 unique domains commonly associated with malicious activity. Of those, 89% had a lifespan of fewer than 24 hours, and 94% had a lifespan of fewer than three days. Making it extremely difficult to block using traditional DNS protection services.
Palo Alto on their research saw that close to 70% of all new domains are used for malicious purpose –> Newly Registered Domains: Malicious Abuse by Bad Actors (paloaltonetworks.com)
Now once a threat actor gets access, their approach differs. Some ransomware is just intended to spread and infect files that are available from the infected resources. Some threat actors will try to do lateral movement and try to gain elevated access to be able to 1: Infect as much as possible – Utilizing such as Domain Admins to infect all infrastructure and workstation within the domain, 2: Steal corporate data which they then upload somewhere and auction the data or hold the business “hostage”. Threat Actors that want to get a higher level of privilege using different lateral movement techniques and tools to move around in the environment and in the end try to get access to a domain admin account.
Another issue that many companies have been facing when their systems got compromised and data was encrypted, was that their backup software also get impacted, which means that backup data was also encrypted.
So how can we protect our business completely from these kinds of attacks? First of it is important to map your environment and understand where those initial attack vectors are and determine the risk. Therefore, I decided to split it into different sections and describe ways to reduce the attack surface and reduce the risk for ransomware in your environment.
When planning to implement countermeasures first understand what your weak spot is first, which you should prioritize
- Do you have control of your external service and supply-chain?
- Do you have control of your endpoints?
1: Credential Stuffing
This is a brute-force attack technique, but instead of trying to guess passwords using “dictionaries” of common word combinations, attackers use lists of known valid credentials obtained from data breaches. As a company, there are some tools and services that you can use to determine if user credentials have gotten compromised. 1: Is through Azure AD Identity Protection, if you are using Azure AD as your main authentication service 2: Subscribe to haveibeenpwnd.com using domain search 3: Other tools like F-Secure Identity protection https://www.f-secure.com/en/home/free-tools/identity-theft-checker
Again, to prevent future compromised credentials on 3. party websites, this is all about educating users about the risk of reusing usernames and passwords on other websites. Now regardless of if we educate our end-users, there will always be someone that forgets, so it is important that we have proper monitoring and logging in place to determine WHO / WHAT / WHERE / WHEN someone logged into our services. An example of monitoring tools that can be useful here is Azure Log Analytics which can be used to collect security events related to Active Directory and other services using other log formats such as Syslog.
Also, important that you have properly configured Group Policy to ensure that important activities are logged into the security logs according to the baseline defined here –> https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations (as part of Stronger Recommendation policy)
The second part is to have some form of a centralized logging tool that you can monitor for these types of activities. There are many tools such as GreyLog, ELK, SumoLogic, Splunk or one common one Azure Log Analytics with Sentinel.
Using Log Analytics, you can then see when someone logged in, and if combined with Azure Sentinel you can also provide ML to determine abnormal user behavior to logon processes to services such as running RDP (https://docs.microsoft.com/en-us/azure/sentinel/connect-windows-security-events)
Here is also a list of different hunting queries that can be used together with collected logs (https://github.com/Azure/Azure-Sentinel/tree/master/Hunting%20Queries/SecurityEvent)
But to show one example if someone is trying to log on to some external services that are using Windows-based authentication that I can monitor using Security Events.
| where EventID == 4625
| summarize count() by Account
This simple query can monitor for failed logon attempts too Active Directory and summarize based upon which account that has most failed logon attempts.
While Log Analytics and Sentinel is more based upon predefined queries that need to be built and monitor against Active Directory, Microsoft also has a specific product called Azure Advanced Threat Protection which monitors and analyzes user activities and information across your networks, such as permissions and group membership, creating a behavioral baseline for each user. This is not a replacement for traditional logging but is useful to detect certain attacks and lateral movement inside your domain.
Of course, an important aspect at least for Azure AD is Conditional Access
- Configure Conditional Access
- Block legacy authentication protocols
- Ensure MFA for all users
- Conditional Access Starter Kit: Conditional Access Starter Pack – Good Workaround!
- Review the audit logs regularly and verify traffic from countries
- Can determine if user credentials have been leaked (You can use this as a lookup for the different EventID’s –> azuread/azuread.md at main · msandbu/azuread (github.com)
Also make sure that people do not have full admin access by default where you can use for instance features like Access Packages with Entitlement Manager or PIM.
Also for Cloud ensure that you don’t have administrator accounts in AD synchronised to Cloud.
2: Brute Force Attacks / Password Spray Attacks
When it comes to brute-force attacks or password spray attacks. This is determined on what kind of services the attackers are trying to brute force, therefore I listed some of the identity solutions / services and lists some of the protection mechanisms that you can use.
- ADFS: Many organizations have been affected by password spray attacks, where they had an outdated version of ADFS configured which was not enabled with any type of MFA solution, and therefore open to password spray attacks. Attacks are also often trying a range of usernames and therefore makes it difficult to block specific users. The best approach is to 1: Enabled extranet smart lockout feature (https://support.microsoft.com/en-us/help/4096478/extranet-smart-lockout-feature-in-windows-server-2016) and integrates with Azure MFA using the native integration https://docs.microsoft.com/en-us/windows-server/identity/ad-fs/operations/configure-ad-fs-and-azure-mfa
- Azure AD / Office 365: Within Office 365 the biggest attack vector with password spray attacks are attacks trough the legacy authentication protocols, disabling these protocols will make it difficult for attackers to do password spray attacks (https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/block-legacy-authentication) but again as mentioned the Seamless SSO endpoint is still vulnerable for brute force attacks. You can monitor this using Log Analytics as well as using this Query
SigninLogs | where parse_json(AuthenticationDetails).authenticationMethodDetail
== “Password Hash Sync”
| where parse_json(AuthenticationDetails).authenticationStepResultDetail ==
“Invalid username or password or Invalid on-premise username or password.”
- Other SaaS services: For other Web applications and services, it is important that you as a company try to standardize on a single iDP (Identity Provider) for your end-users. If you are using third-party SaaS services, look to integrate those with Azure AD to provide a centralized idp solution. Secondly if supported collect logs and activity monitor logon attempts to those as well, some SaaS services support integration against Microsoft Cloud App Security to monitor abnormal behavior. Here is an example of integrating ServiceNow with Cloud App Security –> Service Now and Cloud App Security (MCAS) | Marius Sandbu (msandbu.org). It should be noted that this integration is pretty limited for 3.party SaaS applications. But you should always when looking for SaaS service ask for how the vendors provide security and identity around their service.
- Validating URL input
- Restrict access to certain URL’s
- Block against common attack types (Such as OWASP top ten)
- VPN / Remote Access solutions: An important part is that providing a VPN or remote access solution is having again a centralized identity service. If you are already using Azure AD for MFA services, then look to implement the same MFA solution against the remote access or VPN service which can be done using the NPS Extension to provide a RADIUS integration against the VPN provider https://docs.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension-vpn or a better solution is if the remote access solution supports SAML and can be directly integrated against Azure AD. However, you should after replacing VPN with other remote access solutions wherever possible, where you only provide access to a given application instead of providing access to the entire network.
- RDP: If you need to have RDP exposed you should investigate if you could replace it with another service such as Azure Bastion, JIT services or proxy services which are available. RDP is one of the most exploited endpoints.
Regardless of services that you have the most important aspect is making sure that services have logging enabled so that you have visibility into what is going on.
In addition, a more secure approach is if you have centralized your services to use a common iDP is to use a more secure authentication method as an alternative to password, which is FIDO 2 based authentication using physical keys such as Yubikey.
3: Exploiting Vulnerabilities
Protection against vulnerabilities is simple but yet difficult at times which is patching. This may sound simple, but most companies struggle since their environment is complex and lacking the visibility to see the threat landscape and having the resources to follow this up. There have been many companies that got compromised because of an unpatched Pulse VPN software 6 months after the vulnerability became known, same has been the issue with Microsoft Exchange where there was a big vulnerability https://healthitsecurity.com/news/82-of-vulnerable-microsoft-exchange-servers-remain-unpatched. This means that organizations can do a couple of things
- 1: Follow the current threat landscape and looking at the trends based upon services that are deployed inside the company, then patch when new vulnerabilities emerge
- 2: Outsource services, to a cloud service or to a trusted partner. Now the issue that many companies are struggling with is resource/expertise to handle this on their own. Using a cloud service as an alternative can be an option or that you use a service provider.
- 3: Having a threat and vulnerability scanning solution which can also provide insight into current threats to be able to easier see vulnerabilities in your organization. As an example, here Microsoft provides Defender for Cloud which can do threat detection on infrastructure and services, also together with Qualys provide application-based vulnerability scanning.
- 4: There are also 3. party services such as Secunia that monitor 3. party tools as well and can provide patches for those.
I always recommend at least building up an RSS feed of the most common products so that you can get notified if a vendor has a new patch available.
4: Compromised endpoint
Now since most infections and cyberattacks starts with an email it is important that you have predefined security in place in your email service to block as much phishing email as possible and remove spoofed email from internal domains and have scanning of attachments and URLs in links to ensure that users are not tricked into running some form of payload on their endpoint.
Now there are a couple of things that need to be part of this security chain.
- 1: Email based security:
Here there are different security mechanisms that needs to be in place to reduce the amount of spam mail, such as looking into the DNS security. This is where some core DNS specifications to DMARC, DKIM and SPF which provides the following. Put simply, SPF, DKIM and DMARC are ways to authenticate your mail server and to prove to ISPs, mail services and other receiving mail servers that senders are truly authorized to send email. When properly set up, all three prove that the sender is legitimate, that their identity has not been compromised, and that they’re not sending email on behalf of someone else. These features can limit the use of spoofed emails looking to originate from within your own organization and can therefore also limit the use of phishing attacks. There is also a guide that highlights a lot of the security best-practices for Office 365 and the surrounding ecosystem (https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2MHP5)
Office 365 also has many different security mechanisms that can be used to detect and block email containing malicious attachments and malicious URL’s. These services are part of Office 365 ATP https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/office-365-atp?view=o365-worldwide
They also have anti-phising features which uses Machine Learning to detect abnormal behaviour https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/set-up-anti-phishing-policies?view=o365-worldwide#exclusive-settings-in-atp-anti-phishing-policies
Another one is to add a header for all external incoming mail (as a warning header –> Set an “External Email” header on inbound emails Office 365 – MS Exchange – Spiceworks )
Enabling a filter to restrict the ability receive certain filtypes –> How to block message from being sent or received – Exchange | Microsoft Docs
- 2: Endpoint based security
If the attackers managed to send an email which has bypassed all the traditional email security features, then the next part is having features in place to ensure that the endpoint doesn’t execute the payload or be able to block the content.
The first aspect is having a client which is running anti-malware and EDR solution to be able to see process/files/registry changes and activity on the machines and be able to block against threats either based upon signatures or other sandbox detection mechanisms. In many cases, new malware and payloads don’t need a lot of permissions or are a new variant and therefore undetected by many anti-malware providers which also means we need more layers of security. To showcase some of the features which can be used to provide protection in the different layers.
* Application Guard (Which is now available for Browsing and Office –> https://support.microsoft.com/en-ie/office/application-guard-for-office-9e0fb9c2-ffad-43bf-8ba3-78f785fdba46 ) runs content in a locked-down VM container which prohibits communication with host OS.
* Enabling Identity Guard to ensure that hackers are not able to decrypt the local user database stored in LSASS.
* Restrict Administrator rights and if the user needs admin rights provide an option like makemeadmin –> https://github.com/pseymour/MakeMeAdmin/wiki
* Restricting PowerShell and logging activity –> https://www.digitalshadows.com/blog-and-research/powershell-security-best-practices/
* Removing older versions of PowerShell and enabling Logging of PowerShell Commands
* Having an EDR and Antivirus system installed that can monitor for abnormal activity. Here is a real-life test of different vendors –> https://www.av-comparatives.org/tests/real-world-protection-test-july-august-2021-factsheet/)
* Use Attack Surface Reduction Rules – Such as enabling that Microsoft Office are not allowed to spawn child processes (Here is a list of Attack Surface Rules –> https://blog.palantir.com/microsoft-defender-attack-surface-reduction-recommendations-a5c7d41c3cf8)
* Get clients to use malware filtering DNS Services (such as 220.127.116.11 from Cloudflare)
* Block RDP to Client (No I’m not kidding, with increased clients working from home during COVID many have been plugging their device directly to the router and with it getting a direct public IP address and from there have been targeted for brute force attacks.
* Locking down using Baseline configuration. You can for instance using CIS Benchmark to lock down and provide security best practices for Windows. https://www.cisecurity.org/benchmark/microsoft_windows_server/
Some other countermeasures are
- Deactivate running of Office Macroes (Group Policy)
- Change default file behaviour for HTA/JS/JSE files using Group Policy
- Apply the latest version of Microsoft Edge to provide built-in Password Monitoring using Policies as well to ensure that it is not able to connect to self-signed websites or non-secure websites.
- Have an extension in place for Edge/Chrome that can monitor Pop-ups
- Whitelist extensions to ensure that users do not install a malicious extension
- Enforce Chromium Updates using Group Policy (also ensuring that the client actually restarts)
- Configured default applications for certain file extensions to open in Notepad (instead of browser)
- 3: Monitoring and logging
Now regardless of which service you are using for email, it is important to have proper logging in place to ensure you have visibility into email traffic and also see what is going on from an endpoint perspective. A lot of the ransomware payload today which is running on the endpoint which can start as an simple excel sheet or word document with a macro or a executable which runs a powershell script and psexec command to download more payload or communicate with other resources on the same network.
Office 365 provides an extensive logging feature which can be enabled (not enabled by default): https://docs.microsoft.com/en-us/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?view=o365-worldwide and can also be forwarded to Log Analytics or Azure Sentinel to provide a centralized log management service. This in conjunction with an EDR tool to map events against processes and file changes and network communication to detect abnormal traffic or behaviour.
This list also highlights some of the different log sources that should be collected to be able to monitor for abnormal behaviour in a windows based environment –> https://www.cyber.gov.au/sites/default/files/2019-10/PROTECT%20-%20Windows%20Event%20Logging%20and%20Forwarding%20%28April%202019%29.pdf
- 4: Design to reduce infection to other parts of the infrastructure
So what if your endpoint is compromised and the attackers have managed to bypass all the security mechanisms that are part of your security platform? Historically endpoints have been bart of Active Directory and been one happy family. This presents a problem, this means if that someone managed to compromise an account/device which has elevated level of access it will also automatically spread to other part of the infrastructure the users have access to.
From there they can also use a range of different tools and techniques to do lateral movement, climbing further up in the infrastructure and trying to get higher level of access to systems. The end goal? to be able to infect/distribute their ransomware to as many end-users/devices as possible. Such as the operators behind the MAZE ransomware use a combination of tools such as Bloodhound and PingCastle to map and understand customers Active Directory structure. They also often leverage tools such as Procdump and Mimikatz to collect end-users’ credentials for a later stage attack.
Once the attackers get high-level access to a set of privileged user accounts, they strike. Using a combination of different built-in functionality and tools to propagate the ransomware. The attackers often use tools and built-in features like
- Group Policy
- Administrative shares, Network Shares
- Microsoft PsExec tool
- WMI, SMB or other remote tooling to deploy the payload/executable
- They have also been known to leverage unpatched exploitation methods (e.g., Eternal Blue – addressed via Microsoft Security Bulletin MS17-010).
Countermeasures to apply to reduce the risk
- Disable older versions of SMB protocol
- Ensure SMB Signing is enabled
Enable “Deny log on through Remote Desktop Services” Group Policy to restrict lateral movement using RDP. Stop/Disable unneeded services such as Print Spooler on Domain Controllers (This page gives some general recommendations in terms of services –> Security guidelines for system services in Windows Server 2016 | Microsoft Docs)
- Upgrade to newer versions of PowerShell and remove older versions
- Collect log data from Windows Event Log “PowerShell Operational”
- Install Windows LAPS (Free) Download Local Administrator Password Solution (LAPS) from Official Microsoft Download Center
- Use Group Policy to deny access to this computer through remote desktop services Group policy
- Ensure that you have adequate logging for infrastructure, use this list as a recommendation –>
- Use Sysmon to collect process monitoring if not other monitoring capabilities are available
- Monitoring DNS traffic for queries to malicious domains can be done using Log Analytics and DNS monitoring (or Sentinel)
- Block Traffic to and from Tor Addresses using some form of IP reputation or DNS filtering (pref both) and NDR (Newly Created Domain Records)
- External Services should be monitored for known vulnerabilities.
- Block Outbound Internet access for parts of the infrastructure where it is not needed. Traffic should be opened on a needed basis such as for patch management or monitoring.
Which they then use to distribute the ransomware across clients, servers, and data in the organization to infect as much as possible.
Much of the technique they use to distribute their ransomware is possible because of the way Active Directory is configured and has historically operated, where end-users and devices have been part of a large trust-based architecture. Which means that if you are on the inside you can based upon the architecture get access and SSO to resources if you have access.
One way around this is building an architecture using Azure Active Directory.
Moving end-users and devices to an Azure AD based management, means that devices are no longer part of the Active Directory domain. Much of the innovation and development that Microsoft is now doing is within the Windows 10 and the ecosystem. Also seeing that moving forward Azure AD will be centralized management service as will replace Active Directory.
Moving devices to Azure Active Directory means that we can use conditions to determine if a user/device should get access to data and applications. Looking back an example with an infected device, we can with Azure Active Directory have Conditional Access Policies which are then used to determine the health of the device and user to ensure that there is no risk before they are allowed access to the data. With the machines being Azure AD based, it means that attackers cannot directly leverage lateral movement techniques against admin shares and network drives using regular SMB protocols or tooling like Group Policy.
Azure Active Directory also collects health/risk information from multiple sources to determine the risk of the user and the device the user is coming from, such as Defender ATP, Azure ATP, and Microsoft Intune. These in turn can be used to determine if the user or device are allowed to access data or an application.
Another part to reducing the impact of ransomware attacks, is that data should be moved away from traditional file servers to a type of cloud-based storage solution such as OneDrive For Business where you have versioning capabilities, there are few ransomware attacks that affects cloud-based storage from an end-user client. Secondly storage services which are integrated with Azure AD means that we can have the same security mechanisms in-front of storage services as well.
5: Protecting backup services
If we manage to move to a full Azure AD-based management for our end-users and clients, many servers and applications might still be dependant on Active Directory. Therefore, it is also still important if you want to protect against ransomware attacks that you
- Have an Active Directory disconnected backup solution (reduces the risk for lateral movement) and encrypting backup services.
- Have an offline backup (reduced the risk that backup data is also encrypted)
- Back up important files regularly. Use the 3-2-1 rule. Keep three backups of your data, on two different storage types, and at least one backup offsite. This can be easily done using Cloud-based backup solution as a cheap offsite backup option, such as Azure Backup or Veeam Backup.
- Verify backup data integrity and that you have a Disaster Recovery plan.
- Also, there are different features in M365 and Windows 10 you can use to reduce the risk of ransomware attacks or the effect it has –> https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/recover-from-ransomware?view=o365-worldwide
The most important part is educating the users so they can identify social engineering and spear-phishing attacks. Since the initial compromise often happens through email or malicious websites. A good indication of checking if a website or domain is part of ransomware or phishing attack you can use
6: Encrypt your data
To ensure that your business will not be held for ransom, ensure that your data is encrypted in real-time as well. Using products such as Azure Information Encryption and other features which can be used to encrypt data to ensure that if attackers gain access to it that they are not able to use it for ransom. This of course is not applicable for all types of data, but to ensure that data is not directly readable. This is also something that Microsoft is pushing and providing new capabilities as part of Endpoint DLP.
Consider this that many organizations are using default services such as Windows File Servers, Windows SQL that by default store data non-encrypted. What if those databases or files store sensitive data which was then exfiltrated during a ransomware attack?
Now the final advice I want to give, it is important to understand the current threat landscape that we are currently facing. With big new vulnerabilities being discovered on a weekly basis it is important to understand the consequences if you do not patch as soon as possible to reduce the vulnerability. If you do not have the capacity to ensure lifecycle management of these products you are using, get a partner or someone to provide managed services to ensure that the security is maintained. Also, map your current environment ensures that you don’t have any exposed services and if so, determine the risk and apply any countermeasures that you might apply.
One thing, that most forget. Most of all ransomware attacks are aimed at Windows-based environments consisting of Active Directory and File Shares. Moving your endpoints to an Azure AD-based environment will effectively kill that chain so that attackers cannot do directly from your clients to your infrastructure. So, for 2022, consider that it’s time to look to a more modern way of managing your devices and even look at implementing a SASE based mobile platform –> SASE – The next generation of services we need to protect the mobile workspace? | Marius Sandbu (msandbu.org)