Protecting your organization from ransomware
In latest massive ransomware attack, WannaCry hit the cyber world hard, infecting an estimated 200,000 computers across 150 countries. With the increase of ransomware attacks over the last few years, an average of 25,000 attacks per month in 2015 and 56,000 in 2016, it's becoming a cybersecurity necessity to be proactive about making sure your network and your cloud aren't at risk. This article explains how you can use Cloud App Security to monitor your cloud, detect and mitigate threats and apply best practices for protecting your environment against ransomware.
What is ransomware?
Ransomware is a cyber attack in which the attacker sends you a file that can block you from accessing your computer and encrypt your own files. The files are sometimes held for ransom and aren't decrypted until you pay the attacker to restore access to your computer, files or critical LOB apps. Ransomware attacks can affect any computer, home, office, network or server. In fact, because large organizations are made up of many users who may inadvertently open a file that unleashes ransomware across your network, organizations are at even greater risk of being forced to pay the attacker to stop the ransomware and restore access to computers or files.
This use case applies to Office 365, G Suite, Box and Dropbox.
A user in your organization is the target of a ransomware attack. The user might unknowingly open an email infected and run ransomware which infects the all of his files, including the files synced to the cloud.
Detect potential ransomware on your cloud environment by creating a policy to update you when suspicious activity is detected, and set up automated actions to prevent ransomware files from being saved to your cloud.
Connect at least one cloud app (Office 365, G Suite, Box and Dropbox) to Cloud App Security.
Setting up monitoring
By default, Cloud App Security scans your network to establish a baseline, wherein it learns patterns of what your users ordinarily do in your cloud, when they do it and what they commonly do.
In addition, it is important to start monitoring your cloud apps by setting up a policy that will watch your cloud apps for massive downloads and alert you if something out of the ordinary happens:
On the Control tab, click Templates.
From the Policy template list, choose Potential ransomware activity.
- This template is designed out-of-the-box to search for activity typical of ransomware attacks, and files and folders associated with known ransomware. Optionally, you can set the type of alert you receive (email and text message) when the policy is matched.
- Click Create.
Investigating your matches
In the Policies page, click on the policy name to go to the Policy report and review the matches that were triggered for the policy.
You can investigate the match by clicking on a specific match to open the activity drawer. In the drawer, you can see the other policies that this activity matched.
Validating your policy
- To simulate an alert, change the extension of 30 files to .wncry and upload them to your SharePoint site.
- Go to the policy report. An activity policy match should appear shortly.
- You can click on the match to see which files were downloaded. The match itself will be masked to protect the sensitive data.
Remediating attacks and preventing risk
After you've validated it and fine-tuned the policy, remove possible false positives that may have matched your policy. Then, do the following:
When a ransomware policy is matched, you can remediate it by setting automated governance actions.
To prevent future attacks, setting the policy to perform automatic governance actions. For example, in SharePoint and OneDrive you can set the policy to automatically Suspend user.