Background
Ransomware happens when an unsuspecting user clicks on a link within an email message or download a small piece of software unknowingly from a website. This software, often disguised as something legitimate, proceeds to encrypt all of the files on your computer system. The latest variants event target the network drives if you are connected to a corporate or business network. The result is that it encrypts all company files located on the network drive. It spreads rapidly from computer to computer until all computers are infected and files are encrypted.
Users are left with a note on their computer desktop instructing them to purchase bitcoin and send the digital currency via email to the author of the ransomware. After receipt of the email, the author sends a software key to the user to decrypt their files. Beware that there are many cases where the author does not respond back with the key. In this case you are left with nothing.
According to FBI...
Here are some tips for dealing with ransomware (primarily aimed at organizations and their employees, but some are also applicable to individual users):
- Make sure employees are aware of ransomware and of their critical roles in protecting the
- organization’s data.
- Patch operating system, software, and firmware on digital devices (which may be made easier through a centralized patch management system).
- Ensure antivirus and anti-malware solutions are set to automatically update and conduct regular scans.
- Manage the use of privileged accounts—no users should be assigned administrative access unless absolutely needed, and only use administrator accounts when necessary.
- Configure access controls, including file, directory, and network share permissions appropriately. If users only need read specific information, they don’t need write-access to those files or directories.
- Disable macro scripts from office files transmitted over e-mail.
- Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
- Back up data regularly and verify the integrity of those backups regularly.
- Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up.
source: https://www.fbi.gov/investigate/cyber
What can you do...
The latest variants took advantage of unpatched Windows PCs. Simply apply the latest security updates in order to ward off these variants.
We also know that SMBv1 is the main culprit. Microsoft actually discourage use of this protocol. ZDNet recently posted an article relating to the subject.
According to ZDnet (1) Two devastating global ransomware outbreaks, WannaCry and Petya, spread quickly because of a vulnerability in one of the internet's most ancient networking protocols, Server Message Block version 1 (aka SMBv1).
Your PCs that run Windows 10 are protected from that exploit, but that doesn't mean you'll be so lucky the next time.
In the interests of implementing a comprehensive, multi-layer security policy, Microsoft recommends that you disable the SMBv1 protocol completely. The world has already moved on to SMBv3, and there's no excuse for continuing to let that old and horribly insecure protocol run on your network.
To permanently remove SMBv1 support from Windows 10 do the following:
Open Control Panel (just start typing Control in the search box to find its shortcut quickly). Click Programs, and then click Turn Windows features on or off (under the Programs heading). Clear the check box for SMB 1.0/CIFS File Sharing Support, as shown here. That's it; you're protected.
(1) source: http://www.zdnet.com/article/windows-10-tip-stop-using-the-horribly-insecure-smbv1-protocol/?ftag=TRE-03-10aaa6b&bhid=113555250
(1) source: http://www.zdnet.com/article/windows-10-tip-stop-using-the-horribly-insecure-smbv1-protocol/?ftag=TRE-03-10aaa6b&bhid=113555250