Ransomware
recovery is the process of resuming options following a cyberattack that
demands payment in exchange for unlocking encrypted data. Having good data
backups and a solid disaster recovery (DR) plan are the best ways an
organization can recover successfully from this type of attack. With ransomware
so prevalent, experts are urging businesses to assume that they will be hit
with an attack, so protection and recovery are top of mind.
Ransomware,
a subset of malware, typically gets into a system when a user opens an infected
email attachment or website. Several major attacks have recently made headlines
across the world:
- WannaCry ransomware in May 2017 hit more than 100,000 organizations. The payment total was not high, considering the scale of the attack, but the downtime for organizations led to big losses.
- Petya in June 2017 was first detected in Ukraine government systems before spreading to organizations around the world.
- Bad Rabbit ransomware in October 2017 spread through Eastern Europe.
- A ransomware attack on the city of Atlanta in March 2018 shut down several departments. The cost of the recovery effort was more than $5 million.
To
remain anonymous, attackers often demand payment in the form of virtual
currency such as Bitcoin. The FBI does not recommend paying the ransom,
as access to encrypted files may not be guaranteed and the victim then becomes
known as an organization that will pay, opening itself up to the possibility of
more attacks. Paying also encourages the business model. The government
recommends immediately contacting authorities, such as a local FBI office.
Proper
ransomware recovery is important because an attack can harm or even shut down a
business. Even if an organization doesn't pay the ransom, the cost of downtime
can be catastrophic, due to lost revenue and loss of reputation. As a result,
it's critical to be able to recover quickly from a ransomware attack.
Planning
for ransomware recovery is helpful for an organization not just for responding
to attacks, but for DR as a whole. The planning stage enables an organization
to look at where it may be vulnerable and in need.
Because
ransomware constantly evolves, it's important for data protection vendors to
stay one step ahead of attackers. For example, a new development is ransomware's
ability to attack data backups, in addition to primary workloads, so an
organization must ensure that its secondary storage is protected as well.
Recovering
from a ransomware attack
Ransomware
recovery starts before an attack hit. Organizations following the 3-2-1 rule of
backup are in a good position to recover. With this method, there are three
copies of the data, on at least two different media types, with one copy
offsite or offline.
For
example, using tape storage for one of the backup copies provides an offsite
and offline option. Storage that is not connected to a network is safe from
ransomware. Though tape won't typically have as up-to-date backup data as disk
or cloud storage, it does feature an air gap -- which provides isolation
through lack of network or internet connectivity -- and ensures an organization
can recover at least some of its workloads.
When
an attack hits, IT should take over immediately while users stay off the
network. In its simplest form, IT would wipe the affected systems, ensure the
ransomware is no longer in the network and restore operations from the last
known good backup. To get the organization up and running as quickly as possible,
IT may want to restore only the most critical data and operations first, and
then bring up less important workloads. The cloud is a good option for off-site
backup, but it can take a long time to restore a large volume of data.
As
part of its backup and DR plans, an organization should identify which
workloads are most important to the survival of the business and make sure
those are properly and safely backed up. Ideally, an organization will back up
files frequently throughout the day, using such methods as data replication.
Testing
is key to ransomware recovery. A test can be as simple as running through what
each team member will do in the event of an attack. The most comprehensive
option involves running a full-scale test of backups and failing over
operations as if the attack actually happened.
Security
testing is necessary as well. IT should ensure its security -- such as
antivirus software -- is up-to-date. DR and security teams, if separate, should
be on the same page regarding planning and recovery efforts.
Educating
and training users in advance is optimal, but reminders immediately following
an attack are also good while the issue is still fresh on everyone's minds.
Employees should know not to open attachments or frequent websites they don't
recognize as safe. They should also know to inform IT right away if they see
something suspicious.
Major
ransomware recovery tools and vendors
Data
protection vendors have recently been adding features specific to ransomware
recovery.
- Actifio OnVault technology provides an air gap by creating an unchangeable backup copy on object storage, on premises or in the cloud.
- Acronis software uses machine learning to help prevent a ransomware virus from corrupting data. It attempts to detect suspicious application behaviour before the corruption of files. Acronis Active Protection enables customers to roll back and recover from a point in time before a ransomware attack.
- Asigra Cloud Backup prevents ransomware from getting into backups by embedding malware engines in the backup and recovery stream. The engines are designed to identify a ransomware virus, quarantine it and notify the user.
- BackupAssist CryptoSafeGuard works with existing anti-malware software. It scans and detects suspicious activity in source files that can be related to ransomware, sends alerts and blocks backup jobs from continuing to run until resolution of the issue.
- CloudBerry Backup protects file-level backups when it finds ransomware. It prohibits existing backup data from being overwritten until an administrator confirms an issue.
- Druva inSync includes built-in monitoring and detection tools. Automated alerts flag unusual activity with data in desktops, laptops, mobile devices and cloud applications. The software also helps identify the last safe snapshot.
- Iron Mountain's Iron Cloud Critical Protection and Recovery isolates data, disconnecting it from a network. In the event of an attack, it provides a "cleanroom" to recover data and ensures that ransomware is out of the system.
- Quorum has an appliance specifically designed to recover from ransomware. The Quorum on Q Ransomware Edition takes snapshots of servers and provides server-level recovery.
- Reduxio BackDating serves as a time machine for data, cloning any volume to any point in time for data recovery, and enabling an organization to roll back to the moment before a ransomware attack.
- Unitrends physical and virtual appliances use predictive analytics to help determine if ransomware is operating in a system. Unitrends alerts customers when it detects the ransomware virus, so they can restore from the last safe point in time.
- Zerto's continuous data protection and journaling feature provides the ability to rewind to a point in time before a ransomware attack.
Features
to look for in a tool
Backup
and recovery vendors can help with ransomware-specific issues in a number of
ways.
- Since a ransomware attack can hit at any moment, a tool that can increase the frequency of backups is helpful.
- Increasing the length of backup retention helps an organization that needs to keep files for the long term.
- Data protection products that integrate with malware detection represent an important security crossover.
- Backup software can alert an administrator to unusual rates of change in data, a sign of possible ransomware.
IT
should not rely on a backup product for ransomware recovery. A more
comprehensive and proactive data protection platform is better. It's important
to analyse exactly what a vendor offers, though, as simply saying that an
organization can recover from ransomware with a given product is different from
providing a tangible means of recovering.
Comments
Post a Comment