Lacework - WP - Ransomware - Rising - 040422 - V4
Lacework - WP - Ransomware - Rising - 040422 - V4
rising
A look at how to
battle ransomware
in the cloud
PARTNER
Ransomware, a form of malware Ransomware climbs to the cloud
that seeks to encrypt or According to Forrester, ransomware attacks are being
withhold data unless a ransom executed at an alarming rate. In the first six months of 2021,
ransoms increased to $590 million. As highly commoditized
is paid, continues to rise in attacks become the norm, hackers continue to embrace land
2022. In fact, in just two years, and expand tactics to compromise unsecured remote access
software, overprivileged identities, and unpatched software.
ransomware has experienced While ransomware operators have historically focused on
a 600% increase in attacks. attacking Windows environments, the ability to monetize
expanding Linux/container environments is becoming
This trend is not surprising since cybercriminals
essential for ransomware operations.
remain quite effective at extracting money from
businesses spanning all sizes and industries.
Attackers are consistently improving their existing Top tactical security priorities for all organizations that have been breached
tools to make them even more sophisticated, leaving “Which of the following initiatives are likely to be your organizations top tactical
information/IT security priorities over the next 12 months?” (Top 11 responses)
under-resourced security teams struggling to keep
up. The pace of attacks has also increased with the
Improving application security capabilities and services 21%
adoption of ransomware-as-a-service (RaaS) toolkits
and ransomware affiliate programs. Now just about Improving identity and access management tools and policies 20%
anyone, technical or not, can exploit victims for Implementing artificial intelligence (AI)
technologies to improve security
19%
ransom with ease. Improving threat intelligence capabilities to proactively identify 18%
security threats targeted to your organization or industry
what’s driving the spike, best practices to reduce Establishing and/or enhancing e–discovery practices 18%
risk, and how Lacework can help organizations stand Securing industrial control system (ICS) or 18%
operational technology (OT) environments
up to ransomware with better visibility, detection, and Introducing cyber risk qualification 17%
technologies to support board reporting
investigation to speed response.
Moving security services to the cloud 16%
0% 15% 25%
Base: 778 security decision–makers who have experienced a breach in the past 12 months
Source: Forrester Analytics Business Technographics® Security Survey, 2021
1 2 3
Ransomware can compromise Criminals most commonly Criminals can target cloud
a victim’s endpoint, gain direct access by and storage providers and
and then explore what phishing individual users. share credential databases
is accessible from this If successful, they can explore in hopes of accessing private
compromised asset. connected resources and encrypt content, often by way of password-
If cloud services are discovered, or extract sensitive information sprays against a large set of known
they can leverage locally stored from the cloud services that the accounts, compromising endpoints
credentials or otherwise ride compromised user has access to. In a directly, or sometimes even
access into cloud services in order majority of cases, they move laterally, leveraging exploits. If successful,
to gain access to additional assets either through remote interaction and if personal accounts have a
and resources. (This is the most or automation via their malware, business link, a single attack can
commonly used method.) to access adjacent resources. If compromise many accounts and
the ransomware piggybacks on a customer data.
connection to an online file sync
service, it can then gain access to
cloud assets and resources, and
encrypt stored data or even the
hosts themselves.
Early Incident
Compliance Hardening Root Cause
Detection Response
Cloud Security Posture Behavioral Anomaly Detection 180 Day Data Retention
Management (CSPM)
File Integrity Monitoring Context Rich Event Cards
Vulnerability
Host Intrusion Detection Command Line Visibility
Multicloud
Runtime Detection 3rd Party Remediation/Orchestration
Lacework helps organizations improve their cybersecurity Lacework offers a policy to track “MFA delete” in S3 buckets
posture by focusing on prevention, detection, and the ability to combat an attacker from disabling the versioning and
to investigate and respond quickly. These features build overwriting/deleting existing versions. This feature forces MFA
communication between internal and external stakeholders to either change the versioning state of the specified S3 bucket
and help align cybersecurity risk management with broader (i.e., disable versioning) or permanently delete an object
enterprise risk management processes. version if both versioning and MFA delete are enabled on a
bucket. This means an attacker would need to compromise the
root user and their MFA device to disable versioning and MFA
delete on the bucket. This is possible in theory, but very unlikely
in practice.
Lacework provides early detection that is critical to detecting ransomware in the cloud. Ransomware is not usually executed
immediately after the initial compromise. The average dwell time of an attacker can range anywhere from five to more than 100
days. During this time, an attacker makes noise within the cloud environment. Lacework uses patented machine learning to
automatically learn activities and behaviors unique to your environment. With runtime visibility and anomaly threat detection,
organizations can alert on abnormal activity and detect an attack.
Lacework helps respond to ransomware attacks by providing configuration monitoring to alert defenders if a door is open,
vulnerability management to allow developers to identify complex software that can be exploited, threat detection to alert
users of unwanted software, and anomaly detection to detect if an attacker is accessing an environment.