What is ransomware?

Ransomware, also known as crypto trojans, encryption trojans, blackmail trojans, or extortion software, is malicious software developed to allow intruders access to a computer's data. Access to the computer's data is either blocked, or all data is encrypted and only unlocked again against payment of a ransom. In this country, the best-known bogeymen are probably Locky, the BKA Trojan, WannaCry, and Emotet.

How does a ransomware infection work?

Email is the most common gateway for ransomware

Phase 1: Infection

How does ransomware enter a company?

Ransomware can enter via file types where it can deposit active code, for example, in Office macros or embedded in PDF files. These files are often sent as email attachments. However, it is also possible to become infected by visiting an infected website, i.e., you can also catch Emotet by clicking on a link.

The programmers of the malicious codes often exploit vulnerabilities in operating systems, browsers, or email clients that the software manufacturers themselves are not yet aware of or at least have not yet closed (so-called zero-day gaps).

Phase 2: Embedding

At first, ransomware does not make itself noticeable and nests on the computer. If, for example, Emotet infects a computer on which Outlook is installed, it intercepts the communication. It notes with whom emails are exchanged and on what topics. It then generates an email from one's own mailbox with a text and a topic about which one has already exchanged with known recipients. This looks like a legitimate email from the sender's hand to the recipient.

Email is, therefore, the riskiest gateway for ransomware.

Phase 3: Dissemination and collection of data

Emotet tries to spread horizontally to other computers. To do this, it uses brute force attacks with known passwords. Of course, it is particularly helpful for Emotet if a computer or user with administrative rights can be infected. With administrative rights, it then spreads horizontally to as many machines as possible and keeps contact with the attackers' command and control center. On the machines it has infected, as much account data, passwords (especially of administrative accounts), and personal data as possible are collected and sent to the attackers.

Phase 4: Blocking and extortion

The attackers gather information and then await the appropriate moment to attack the company.

For example, at the weekend, they can

  • delete all back-ups
  • encrypt machines
  • and then leave a message with their demands.

A ransomware infection can, therefore, be present for months before anyone notices it. That's why tracking where the ransomware came from and how it spreads is very difficult.

Phase 5: Negotiation, payment, and release of data

The instant messaging service Telegram is often used to negotiate the ransom, as the secure architecture of this service makes tracing difficult. Some ransomware has already integrated a corresponding negotiation functionality. Provided you agree on a sum with the extortionists, the ransom is usually paid in the form of bitcoins.

However, experts and investigating authorities often advise against accepting a ransom demand; too usually, the data is not decrypted despite payment, and the computers are still locked. 

How can you protect yourself from ransomware?

Can ransomware be prevented?

Ransomware cannot be prevented, but various methods exist to protect against and react to it.

Tips for protection against ransomware

To protect yourself from ransomware, you can try to close as many gateways as possible.

  1. No longer accept any files at all via email that could contain malicious code.
  2. Prevent or limit the execution of any code for file types that could be affected.
  3. Stop receiving and sending any files that contain executable code.
  4. Company-wide blocking of USB ports on computers and prohibition of USB sticks.
  5. Use alternative channels to conventional email.

Employees must also be informed that they should be cautious when files want to execute macros. If in doubt, consult the author of the file. The same applies when clicking on links.

Adapt backup strategy

A possible reaction to Emotet is, for example, backup software that detects when many files on the computer are changed. This software then locks the computer and offers to restore the backup. However, the "sleeping" ransomware may be already saved in the backup, infected files are restored, and the attack is triggered again after some time. Only offline backups and, if possible, going back a long time (several months) are helpful here.

How can ransomware be prevented?

Alternative transfer path

Cryptshare, a part of the Pointsharp Secure Information Exchange solution, uses a way to transfer files and messages that ransomware cannot automatically attack at the moment. Since attackers want to make money with as little effort as possible, you become rather uninteresting as an extortion victim.

Password protection

To protect against ransomware, the option "send without password" should also be deactivated. If a password exchange is required between sender and recipient, there is a chance that the sender is not genuine.

Logging all processes

With Cryptshare, much more information is logged because the Cryptshare server logs who sent something and when. Therefore, the attacker loses their anonymity to a certain extent and takes a greater risk with regard to tracing.

Cryptshare Product
Download
Download: Cryptshare tech sheet

Cryptshare by Pointsharp makes it easy for your staff to send encrypted email messages and attachments of any size at any time to internal and external recipients directly from your existing email system.

Hiking Atmosphere Horizontal
Download
Download: Best practise for email security

Learn more about a successful email encryption with our 10 practical considerations.

Atmosphere Shipping
Solution

Our solutions to send large files give you an intuitive to use solution that removes both the work and risk from the equation.

Cryptshare For Outlook
Solution

Transfer large, sensitive, and classified files with the click of a button. All encrypted, tamper-proof, and compliant.