Akamai 5 Step Ransomware Defense Ebook
Akamai 5 Step Ransomware Defense Ebook
Akamai 5 Step Ransomware Defense Ebook
Akamai.com 02
Introduction
Akamai.com 03
The business of ransomware will cost you Did you know?
In 2022, a ransomware attack forced 7-Eleven to close 175 stores as they were unable to use their cash
registers or accept payment. Earlier that year, a BlackCat ransomware attack on a German oil company
The average cost
impacted 233 gas stations, with Royal Dutch Shell having to reroute their shipments to different supply
depots because of the issue. The Colonial Pipeline attack occurred in May 2021, disrupting oil and gas
deliveries all along the U.S. East Coast. And in 2020, the Snake ransomware attack brought Honda’s global
of a ransomware
attack in 2022 — not
operations to a standstill.
Today, through a mix of outdated technology, “good enough” defense strategies focused solely on
perimeters and endpoints, lack of training (and poor security etiquette), and no known “silver bullet”
solution, organizations of all sizes are at risk. Cybercriminals are making it their business to encrypt as
much of a corporate network as possible, to extort a ransom ranging from thousands to millions of dollars.
including the cost of
But there is more at stake than just your bottom line. The aftermath of a ransomware attack can be
detrimental: Downtime can stop business operations, disrupt productivity, and compromise your data.
the ransom itself —
Once proprietary company data is leaked or compromised, you will likely suffer damage to your brand and
loss of customer loyalty. According to a 2020 survey, 80% of data breaches included personally identifiable was $4.54 million.
information (PII) of customers, intellectual property was compromised in 32% of breaches, and anonymized
customer data was compromised in 24% of breaches. Not to mention, threat actors can use this sensitive IBM Security
data against your business or to carry out other insidious acts, including selling confidential data.
With the threat of ransomware propagating quickly across networks, protecting the perimeter alone simply
isn’t enough.
Akamai.com 04
Stop lateral movement.
Stop ransomware spread. You should be worried
A ransomware attack begins with an initial breach, often enabled by a phishing email, vulnerability in the about downtime.
network perimeter, or brute-force attacks that create openings while distracting defenses away from the
16.2
attacker’s actual intent.
Once the attack has landed in a device or application, it proceeds through lateral movement across the
network and multiple endpoints to maximize the infection and encryption points. Attackers will typically
seize control of a domain controller, compromise credentials, then find and encrypt the backup to prevent
the operator from restoring the frozen services.
Lateral movement is critical to the success of an attack. If the malware can’t spread beyond its landing The average number
point, it’s useless. So prevention of lateral movement is essential.
of days a ransomware
How comprehensive is your ransomware incident lasts.
threat mitigation strategy?
Coveware
Akamai.com 05
Risk mitigation Four ways to make security planning a priority
Building an iron-clad Security should be part of your organization’s broader preparedness strategy,
planning, and budget. This means raising awareness with C-level executives
defense strategy and board members, and remaining vigilant about potential risks and what
you need to mitigate them.
1.
Detecting and preventing lateral movement inside your network boils Make sure you include cybersecurity in the function that manages
down to two main focus areas: First, reduce the initial attack vector, and overall risk mitigation for your organization. And ensure there is
then limit the propagation paths. security expertise on your leadership team.
2.
You can do things like limit the amount of servers that are exposed to Don’t forget to dedicate budget and resources into backup generation
the internet, keep up with patch management to ensure a smaller attack and network segmentation.
surface, practice ringfencing to reduce the propagation paths between
applications, and back up your data so you can get back online quickly
and avoid widespread data loss if an attack occurs.
3. Create response plans in advance of a disaster or adverse event
(like a ransomware attack). Being organized and prepared means
you can react more quickly and efficiently.
Akamai.com 06
Ransomware detection checklist
If your organization is like many others, detecting ransomware Strong visibility Segmentation policy
can be a challenge. Unfortunately, this means your network
is vulnerable to attack. Without strong detection capabilities, If you don’t know what’s happening Once every communication is
by the time you receive a ransom note, it’s already too late: in your network, you can’t detect defined and accounted for, anything
Most of your network will be encrypted at the same time. ransomware or other unwelcome outside the norm will rise to the
cyberthreats. surface, and you will be alerted.
Akamai.com 07
Building a ransomware defense strategy
Despite the best perimeter defenses, breaches are inevitable. This is why you must have a defense strategy in place that minimizes the effectiveness of an attack and stops
the spread within your network. Find a vendor that offers a comprehensive security solution that detects threats in east-west data center traffic and blocks lateral movement.
Akamai.com 08
Conclusion
Akamai protects your customer experience, workforce, systems, and data by helping to embed security into everything you create — anywhere you build it and
everywhere you deliver it. Our platform’s visibility into global threats helps us adapt and evolve your security posture — to enable Zero Trust, stop ransomware, secure
apps and APIs, or fight off DDoS attacks — giving you the confidence to continually innovate, expand, and transform what’s possible. Learn more about Akamai’s cloud
computing, security, and content delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn. Published 05/23
Akamai.com 09