Whitepaper Ransomware
Whitepaper Ransomware
RANSOMWARE
A GROWING
ENTERPRISE
THREAT
2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
In fact, they're looking for new ways to tap into even more
revenue from ransomware operations, which leads us back to
the business risks. Cybercriminals are starting to recognize
that if consumers or one-off business users are willing to
pay $300 to $500 to unlock run-of-the-mill data on a single
endpoint, businesses and other organizations would likely be
willing to pay much more for mission-critical data, or to unlock
an entire fleet of endpoints held hostage in a single instance.
Successful Entrepreneur:
On the business front, savvy pricing models have ensured that
the ransom amount is as high as possible, without turning away
too many potential victims who might give up on their data after
a certain threshold. Business tactics now continue to evolve with
the introduction of ransomware-as-a-service affiliate models.
RANSOMWARE
Unethical Psychologist:
PROTECTION
On the psychological front, they've preyed on basic human
MEASURES
CONSIDER OFFLINE
emotions like desperation, fear and even shame to convince
STORAGE OF CRITICAL
users to pay up. Early on, that started out with police-themed DATA BACKUPS
scareware that claimed the system was locked by authorities
ROBUST ANTI-PHISHING
who detected illegal activities using the system. Today the
MEASURES AND
psychological warfare continues to ratchet up. Take, for example, EMPLOYEE AWARENESS
one ransomware scheme that plagued users of the Android Adult TRAINING
Player porn app. It quietly took pictures of users while viewing IMPROVE PATCH
MANAGEMENT PROCESSES
the app's contents and then displayed that picture on the lock
screen along with a ransom demand for $500.
Built-in EDR
Next-gen antivirus provides multiple protections against
attacks including ransomware. Simultaneously, EDR acts like a
surveillance camera recording what takes place on the endpoint.
Any time an endpoint completes an action, whether it is running
an application, connecting to a network, visiting a website or
writing a file, Falcon Host’s built-in EDR capabilities provide
enough data to create a complete picture with the fidelity
necessary to find IOAs. The collected activity information is then
fed into the CrowdStrike Threat GraphTM data model to analyze
and correlate it with billions of events across CrowdStrike’s
entire customer base, spotting anomalies and detecting IOA
patterns to determine if an attack is underway.
Next-Generation Antivirus
CrowdStrike defines next-gen AV as the ability to protect against
known and unknown malware, and even attacks that don’t use
malware. A variety of techniques are combined within next-gen
AV: blocking known malware with signatures, blocking unknown
malware with machine-learning, exploit blocking and mitigation,
and finally, behavioral blocking of malware-free or unknown
attacks using IOAs.
A B O U T C R OW D ST R I K E
CrowdStrike is the leader in next-generation endpoint
protection, threat intelligence and response services.
CrowdStrike’s core technology, the CrowdStrike FalconTM
platform, stops breaches by preventing and responding to
all attack types – both malware and malware-free.
[2] http://icitech.org/wp-content/uploads/2016/03/ICIT-Brief-The-Ransomware-Report2.pdf
[3] http://www.engadget.com/2016/02/19/hospital-ransomware-a-chilling-wake-up-call/
crowdstrike.com
15440 Laguna Canyon Road, Suite 250, Irvine, CA 92618
VE R . 0 8 .15 .16