SlideShare a Scribd company logo
Ransomware
InfectionVectors
Ransomware is frequently delivered through phishing
e-mails to end users. Early ransomware e-mails were
often generic in nature, but more recent e-mails are highly
targeted to both the organization and individual, making
scrutiny of the document and sender important to prevent
exploitation. An e-mail compromise occurs in one of two
ways:
1.	 Receipt of an e-mail containing malicious attachments,
including: .pdf, .doc, .xls, and .exe file extensions. These
attachments are described as something that appears
legitimate, such as an invoice or electronic fax, but
contain malicious code.
2.	 Receipt of an e-mail that appears legitimate but
contains a link to a website hosting an exploit kit.
When the user opens the malicious file or link in the
phishing e-mail, the most frequent end result is the rapid
encryption of files and folders containing business-critical
information and data. Recent ransomware campaigns have
employed robust encryption that prevents most attempts
to break the encryption and recover the data.
Another infection method involves adversaries hacking a
knownwebsitetoplantthemalware. Endusersareinfected
when visiting the compromised website while using
outdated browsers, browser plugins, and other software.
Ransomware is a form of malware that targets both human and technical weaknesses in organizations in an effort to deny
the availability of critical data and/or systems. When the victim organization determines they are no longer able to access
their data, the cyber actor demands the payment of a ransom, at which time the actor purportedly provides an avenue to
the victim to regain access to their data. Recent iterations target enterprise end users, making awareness and training a
critical preventative measure.
Afterinfection,themalwareusuallycallshometocommand
and control (C2) infrastructure to obtain encryption keys
from the adversary. Once keys are obtained, the malware
begins rapidly encrypting files and folders on local drives,
attached drives, and network shares to which the infected
user has access. Organizations are generally not aware that
they have been infected until users are no longer able to
access data or begin to see messages advising them of the
attack and demanding a ransom payment.
While the FBI normally recommends organizations invest
in measures to prevent, detect, and remediate cyber
exploitation, the key areas to focus on with ransomware are
prevention, business continuity, and remediation. It is very
difficult to detect a successful ransomware compromise
before it is too late. The best approach is to focus on
defense in depth, or several layers of security, as there is no
single method to prevent a compromise. As ransomware
techniques and malware continue to evolve and become
more sophisticated, even with the most robust prevention
controls in place, there is no guarantee against exploitation.
This fact makes contingency and remediation planning
crucial to business recovery and continuity, and those
plans should be tested regularly to ensure the integrity of
sensitive data in the event of a compromise.
PreventionConsiderations
•	Focus on awareness and training. Since end users are
targeted, employees should be made aware of the
threat of ransomware, how it is delivered, and trained on
information security principles and techniques.
•	Patch the operating system, software, and firmware
on devices. All endpoints should be patched as
vulnerabilities are discovered. This can be made easier
through a centralized patch management system.
•	Ensure anti-virus and anti-malware solutions are set to
automatically update and regular scans are conducted.
•	Manage the use of privileged accounts. Implement the
principle of least privilege. No users should be assigned
administrative access unless absolutely needed. Those
with a need for administrator accounts should only use
them when necessary; and they should operate with
standard user accounts at all other times.
•	Implement least privilege for file, directory, and network
share permissions. If a user only needs to read specific
files, they should not have write access to those files,
directories, or shares. Configure access controls with
least privilege in mind.
•	Disable macro scripts from office files transmitted via
e-mail. Consider using Office Viewer software to open
Microsoft Office files transmitted via e-mail instead of
full office suite applications.
•	Implement software restriction policies (SRP) or other
controls to prevent the execution of programs in
common ransomware locations, such as temporary
folders supporting popular Internet browsers, or
compression/decompression programs, including those
located in the AppData/LocalAppData folder.
BusinessContinuityConsiderations
•	Regularly back up data and verify its integrity.
•	Secureyourbackups. Ensurebackupsarenotconnected
to the computers and networks they are backing up.
Examples might be securing backups in the cloud or
physically storing them offline. Some instances of
ransomware have the capability to lock cloud-based
backups when systems continuously back up in real-
time, also known as persistent synchronization. Backups
are critical in ransomware; if you are infected, backups
may be the best way to recover your critical data.
Other Considerations
Some other considerations that can be highly dependent
on organizational budget and system configuration
include:
•	Implement application whitelisting. Only allow systems
to execute programs known and permitted by security
policy.
•	Use virtualized environments to execute operating
system environments or specific programs.
•	Categorize data based on organizational value, and
implement physical/logical separation of networks
and data for different organization units. For example,
sensitive research or business data should not reside
on the same server and/or network segment as an
organization’s e-mail environment.
•	Require user interaction for end user applications
communicating with websites uncategorized by the
network proxy or firewall. Examples include requiring
userstotypeinformationorenterapasswordwhentheir
system communicates with a website uncategorized by
the proxy or firewall.
The Ransom
The FBI does not advocate paying a ransom to an
adversary. Paying a ransom does not guarantee an
organization will regain access to their data. In fact, some
individuals or organizations were never provided with
decryption keys after paying a ransom. Paying a ransom
emboldens the adversary to target other organizations
for profit and provides a lucrative environment for other
criminals to become involved. Finally, by paying a ransom,
an organization is funding illicit activity associated with
criminal groups, including potential terrorist groups,
who likely will continue to target an organization. While
the FBI does not advocate paying a ransom, there is an
understanding that when businesses are faced with an
inability to function, executives will evaluate all options to
protect their shareholders, employees, and customers.
In all cases, the FBI encourages organizations to contact
their local FBI Cyber Task Force immediately to report a
ransomware event and request assistance. The FBI works
with federal, state, local, and international partners to
pursue cyber actors globally and assist victims of cyber
crime. Victimsarealsoencouragedtoreportcyberincidents
to the FBI’s Internet Crime Complaint Center (www.ic3.gov).
Contact the Cyber Task Forces at www.fbi.gov/contact-us/field
and the Internet Crime Complaint Center at www.ic3.gov

More Related Content

DOC
Data security
PPTX
Internet safety and you
PPTX
Malicion software
PDF
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
PDF
Introduction to cyber security i
PDF
Chapter 2 konsep dasar keamanan
PPTX
Security threats
PPTX
Types of Cyber Attacks
Data security
Internet safety and you
Malicion software
HCA 530, Week2, Psa i-091516-ransomware notice from fbi
Introduction to cyber security i
Chapter 2 konsep dasar keamanan
Security threats
Types of Cyber Attacks

What's hot (20)

PPTX
Security vulnerability
PDF
Cyber attacks
PDF
8 Types of Cyber Attacks That Can Bother CISOs in 2020
PPT
Network Threats
PDF
Introduction to Information Security
PPT
Introduction To Information Security
DOC
Computer Secutity.
PPTX
Data base security and injection
PPTX
Client server network threat
PDF
Mis 1
PPSX
Ransomware 101
PDF
beyond_the_firewall_0103
PPT
Need for security
PPTX
Types of Cyber-Attacks
PPTX
Dos attack
PPTX
Threats to information security
PDF
Chapter 2 konsep dasar keamanan
PDF
Network security
PPTX
PACE-IT, Security+3.1: Types of Malware
PDF
Chapter 4 vulnerability threat and attack
Security vulnerability
Cyber attacks
8 Types of Cyber Attacks That Can Bother CISOs in 2020
Network Threats
Introduction to Information Security
Introduction To Information Security
Computer Secutity.
Data base security and injection
Client server network threat
Mis 1
Ransomware 101
beyond_the_firewall_0103
Need for security
Types of Cyber-Attacks
Dos attack
Threats to information security
Chapter 2 konsep dasar keamanan
Network security
PACE-IT, Security+3.1: Types of Malware
Chapter 4 vulnerability threat and attack
Ad

Viewers also liked (7)

PDF
Enterprise security: ransomware in enterprise and corporate entities
PPTX
How to stay protected against ransomware
PDF
Ransomware hostage rescue manual
PPTX
What is Ransomware and How to Stay Away from it?
PPTX
Ransomware: How to avoid a crypto crisis at your IT business
PPTX
Ransomware
PDF
Ransomware- What you need to know to Safeguard your Data
Enterprise security: ransomware in enterprise and corporate entities
How to stay protected against ransomware
Ransomware hostage rescue manual
What is Ransomware and How to Stay Away from it?
Ransomware: How to avoid a crypto crisis at your IT business
Ransomware
Ransomware- What you need to know to Safeguard your Data
Ad

Similar to FBI Ransomware Report (20)

PDF
FBI Memo on How to Protect Yourself from Ransomware
PPTX
Back to school - CYBER SAFETY
PPTX
attack vectors by chimwemwe.pptx
PDF
In computer security, a vulnerability is a weakness which allows an .pdf
PPTX
Ransomware: A Perilous Malware
PPTX
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
PDF
PPTX
9.0 security (2)
DOCX
Running head Threat Analysis .docx
PPTX
Computing safety
PPTX
Application security
PDF
Ransomware : Challenges and best practices
PDF
Locking Down Your Data: Best Practices for Database Security
PDF
Saiyed_Crypto_Article_ISSA
PDF
Security Policy Checklist
PDF
Fire eye spearphishing
PDF
Are you the next target?
PPTX
3 Tips to Stay Safe Online in 2017
PPTX
Understanding advanced persistent threats (APT)
PDF
AI for Ransomware Detection & Prevention Insights from Patents
FBI Memo on How to Protect Yourself from Ransomware
Back to school - CYBER SAFETY
attack vectors by chimwemwe.pptx
In computer security, a vulnerability is a weakness which allows an .pdf
Ransomware: A Perilous Malware
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
9.0 security (2)
Running head Threat Analysis .docx
Computing safety
Application security
Ransomware : Challenges and best practices
Locking Down Your Data: Best Practices for Database Security
Saiyed_Crypto_Article_ISSA
Security Policy Checklist
Fire eye spearphishing
Are you the next target?
3 Tips to Stay Safe Online in 2017
Understanding advanced persistent threats (APT)
AI for Ransomware Detection & Prevention Insights from Patents

More from David Sweigert (20)

PDF
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
PDF
Law Enforcement Cyber Incident Reporting
PDF
Sample Network Analysis Report based on Wireshark Analysis
PDF
National Cyber Security Awareness Month poster
PDF
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
PDF
National Cyber Security Awareness Month - October 2017
PDF
California Attorney General Notification Penal Code 646.9
PDF
Congressional support of Ethical Hacking and Cyber Security
PDF
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
PDF
Application of Racketeering Law to Suppress CrowdStalking Threats
PDF
Canada Communications Security Establishment - Threat Vector Chart
DOCX
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
PDF
Cyber Incident Response Team NIMS Public Comment
PDF
Cyber Incident Response Team - NIMS - Public Comment
PDF
National Incident Management System (NIMS) NQS DRAFT
PDF
National Incident Management System - NQS Public Feedback
DOCX
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
PDF
National Preparedness Goals 2015 2nd edition
PDF
Healthcare Sector-wide Disaster Prepardness Plan
PDF
Cyber Risk Assessment for the Emergency Services Sector - DHS
The hacking methods of the Singularity Event doomsday cult (TYLER A.I.)
Law Enforcement Cyber Incident Reporting
Sample Network Analysis Report based on Wireshark Analysis
National Cyber Security Awareness Month poster
Department of Defense standard 8570 - CompTia Advanced Security Practitioner
National Cyber Security Awareness Month - October 2017
California Attorney General Notification Penal Code 646.9
Congressional support of Ethical Hacking and Cyber Security
EXAM NOTES for DOD Standard 8570 CompTia Advanced Security Practitioner (CASP)
Application of Racketeering Law to Suppress CrowdStalking Threats
Canada Communications Security Establishment - Threat Vector Chart
Port of Charleston evacuation case study: The cognitive threat of conspiracy ...
Cyber Incident Response Team NIMS Public Comment
Cyber Incident Response Team - NIMS - Public Comment
National Incident Management System (NIMS) NQS DRAFT
National Incident Management System - NQS Public Feedback
Nursing meets Hacking -- Medical Computer Emergency Response Teams -- MedCERT
National Preparedness Goals 2015 2nd edition
Healthcare Sector-wide Disaster Prepardness Plan
Cyber Risk Assessment for the Emergency Services Sector - DHS

Recently uploaded (20)

PPTX
PEDIATRIC OSCE, MBBS, by Dr. Sangit Chhantyal(IOM)..pptx
PPTX
First aid in common emergency conditions.pptx
PPT
Microscope is an instrument that makes an enlarged image of a small object, t...
PDF
2E-Learning-Together...PICS-PCISF con.pdf
PPTX
CBT FOR OCD TREATMENT WITHOUT MEDICATION
PDF
Dermatology diseases Index August 2025.pdf
PPTX
Genaralised anxiety disorder presentation
PPTX
COMMUNICATION SKILSS IN NURSING PRACTICE
PPTX
Pulmonary Circulation PPT final for easy
PDF
Dr. Jasvant Modi - Passionate About Philanthropy
PPTX
PE and Health 7 Quarter 3 Lesson 1 Day 3,4 and 5.pptx
PDF
Dr Masood Ahmed Expertise And Sucess Story
PDF
MINERAL & VITAMIN CHARTS fggfdtujhfd.pdf
PPTX
Nursing Care Aspects for High Risk newborn.pptx
PPTX
NUTRITIONAL PROBLEMS, CHANGES NEEDED TO PREVENT MALNUTRITION
PPTX
Bronchial_Asthma_in_acute_exacerbation_.pptx
PPTX
Galactosemia pathophysiology, clinical features, investigation and treatment ...
PDF
CHAPTER 9 MEETING SAFETY NEEDS FOR OLDER ADULTS.pdf
PPTX
Trichuris trichiura infection
PDF
Megan Miller Colona Illinois - Passionate About CrossFit
PEDIATRIC OSCE, MBBS, by Dr. Sangit Chhantyal(IOM)..pptx
First aid in common emergency conditions.pptx
Microscope is an instrument that makes an enlarged image of a small object, t...
2E-Learning-Together...PICS-PCISF con.pdf
CBT FOR OCD TREATMENT WITHOUT MEDICATION
Dermatology diseases Index August 2025.pdf
Genaralised anxiety disorder presentation
COMMUNICATION SKILSS IN NURSING PRACTICE
Pulmonary Circulation PPT final for easy
Dr. Jasvant Modi - Passionate About Philanthropy
PE and Health 7 Quarter 3 Lesson 1 Day 3,4 and 5.pptx
Dr Masood Ahmed Expertise And Sucess Story
MINERAL & VITAMIN CHARTS fggfdtujhfd.pdf
Nursing Care Aspects for High Risk newborn.pptx
NUTRITIONAL PROBLEMS, CHANGES NEEDED TO PREVENT MALNUTRITION
Bronchial_Asthma_in_acute_exacerbation_.pptx
Galactosemia pathophysiology, clinical features, investigation and treatment ...
CHAPTER 9 MEETING SAFETY NEEDS FOR OLDER ADULTS.pdf
Trichuris trichiura infection
Megan Miller Colona Illinois - Passionate About CrossFit

FBI Ransomware Report

  • 1. Ransomware InfectionVectors Ransomware is frequently delivered through phishing e-mails to end users. Early ransomware e-mails were often generic in nature, but more recent e-mails are highly targeted to both the organization and individual, making scrutiny of the document and sender important to prevent exploitation. An e-mail compromise occurs in one of two ways: 1. Receipt of an e-mail containing malicious attachments, including: .pdf, .doc, .xls, and .exe file extensions. These attachments are described as something that appears legitimate, such as an invoice or electronic fax, but contain malicious code. 2. Receipt of an e-mail that appears legitimate but contains a link to a website hosting an exploit kit. When the user opens the malicious file or link in the phishing e-mail, the most frequent end result is the rapid encryption of files and folders containing business-critical information and data. Recent ransomware campaigns have employed robust encryption that prevents most attempts to break the encryption and recover the data. Another infection method involves adversaries hacking a knownwebsitetoplantthemalware. Endusersareinfected when visiting the compromised website while using outdated browsers, browser plugins, and other software. Ransomware is a form of malware that targets both human and technical weaknesses in organizations in an effort to deny the availability of critical data and/or systems. When the victim organization determines they are no longer able to access their data, the cyber actor demands the payment of a ransom, at which time the actor purportedly provides an avenue to the victim to regain access to their data. Recent iterations target enterprise end users, making awareness and training a critical preventative measure. Afterinfection,themalwareusuallycallshometocommand and control (C2) infrastructure to obtain encryption keys from the adversary. Once keys are obtained, the malware begins rapidly encrypting files and folders on local drives, attached drives, and network shares to which the infected user has access. Organizations are generally not aware that they have been infected until users are no longer able to access data or begin to see messages advising them of the attack and demanding a ransom payment. While the FBI normally recommends organizations invest in measures to prevent, detect, and remediate cyber exploitation, the key areas to focus on with ransomware are prevention, business continuity, and remediation. It is very difficult to detect a successful ransomware compromise before it is too late. The best approach is to focus on defense in depth, or several layers of security, as there is no single method to prevent a compromise. As ransomware techniques and malware continue to evolve and become more sophisticated, even with the most robust prevention controls in place, there is no guarantee against exploitation. This fact makes contingency and remediation planning crucial to business recovery and continuity, and those plans should be tested regularly to ensure the integrity of sensitive data in the event of a compromise.
  • 2. PreventionConsiderations • Focus on awareness and training. Since end users are targeted, employees should be made aware of the threat of ransomware, how it is delivered, and trained on information security principles and techniques. • Patch the operating system, software, and firmware on devices. All endpoints should be patched as vulnerabilities are discovered. This can be made easier through a centralized patch management system. • Ensure anti-virus and anti-malware solutions are set to automatically update and regular scans are conducted. • Manage the use of privileged accounts. Implement the principle of least privilege. No users should be assigned administrative access unless absolutely needed. Those with a need for administrator accounts should only use them when necessary; and they should operate with standard user accounts at all other times. • Implement least privilege for file, directory, and network share permissions. If a user only needs to read specific files, they should not have write access to those files, directories, or shares. Configure access controls with least privilege in mind. • Disable macro scripts from office files transmitted via e-mail. Consider using Office Viewer software to open Microsoft Office files transmitted via e-mail instead of full office suite applications. • Implement software restriction policies (SRP) or other controls to prevent the execution of programs in common ransomware locations, such as temporary folders supporting popular Internet browsers, or compression/decompression programs, including those located in the AppData/LocalAppData folder. BusinessContinuityConsiderations • Regularly back up data and verify its integrity. • Secureyourbackups. Ensurebackupsarenotconnected to the computers and networks they are backing up. Examples might be securing backups in the cloud or physically storing them offline. Some instances of ransomware have the capability to lock cloud-based backups when systems continuously back up in real- time, also known as persistent synchronization. Backups are critical in ransomware; if you are infected, backups may be the best way to recover your critical data. Other Considerations Some other considerations that can be highly dependent on organizational budget and system configuration include: • Implement application whitelisting. Only allow systems to execute programs known and permitted by security policy. • Use virtualized environments to execute operating system environments or specific programs. • Categorize data based on organizational value, and implement physical/logical separation of networks and data for different organization units. For example, sensitive research or business data should not reside on the same server and/or network segment as an organization’s e-mail environment. • Require user interaction for end user applications communicating with websites uncategorized by the network proxy or firewall. Examples include requiring userstotypeinformationorenterapasswordwhentheir system communicates with a website uncategorized by the proxy or firewall. The Ransom The FBI does not advocate paying a ransom to an adversary. Paying a ransom does not guarantee an organization will regain access to their data. In fact, some individuals or organizations were never provided with decryption keys after paying a ransom. Paying a ransom emboldens the adversary to target other organizations for profit and provides a lucrative environment for other criminals to become involved. Finally, by paying a ransom, an organization is funding illicit activity associated with criminal groups, including potential terrorist groups, who likely will continue to target an organization. While the FBI does not advocate paying a ransom, there is an understanding that when businesses are faced with an inability to function, executives will evaluate all options to protect their shareholders, employees, and customers. In all cases, the FBI encourages organizations to contact their local FBI Cyber Task Force immediately to report a ransomware event and request assistance. The FBI works with federal, state, local, and international partners to pursue cyber actors globally and assist victims of cyber crime. Victimsarealsoencouragedtoreportcyberincidents to the FBI’s Internet Crime Complaint Center (www.ic3.gov). Contact the Cyber Task Forces at www.fbi.gov/contact-us/field and the Internet Crime Complaint Center at www.ic3.gov