{"id":23544,"date":"2023-12-07T05:20:57","date_gmt":"2023-12-07T13:20:57","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2023\/12\/07\/news-17274\/"},"modified":"2023-12-07T05:20:57","modified_gmt":"2023-12-07T13:20:57","slug":"news-17274","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2023\/12\/07\/news-17274\/","title":{"rendered":"Sophos Endpoint: Industry-leading protection against remote ransomware attacks"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Endpoint.png\"\/><\/p>\n<p><strong>Credit to Author: Sally Adam| Date: Thu, 07 Dec 2023 10:25:16 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\" width=\"100%\" height=\"420\">\n<p>Around 60% of human-operated ransomware attacks <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noopener\">now involve malicious remote encryption<\/a>. Read on to learn about this prevalent ransomware attack vector and Sophos\u2019 industry-leading protection capabilities.<\/p>\n<h2>What is remote ransomware?<\/h2>\n<p><strong>Remote ransomware, also known as malicious remote encryption, is when a compromised endpoint is used to encrypt data on other devices on the same network.<\/strong><\/p>\n<p>In human-led attacks, adversaries typically try to deploy ransomware directly to the machines they want to encrypt. If their initial attempt is blocked (for example, by security technologies on the target devices) they rarely give up, choosing instead to pivot to an alternative approach and try again, and again.<\/p>\n<p>Once attackers succeed in compromising a machine they can leverage the organization\u2019s domain architecture to encrypt data on managed domain-joined machines. All the malicious activity \u2013 ingress, payload execution, and encryption \u2013 occurs on the already-compromised machine, therefore bypassing modern security stacks. The only indication of compromise is the transmission of documents to and from other machines.<\/p>\n<p>Eighty percent of remote encryption compromises <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/10\/05\/microsoft-digital-defense-report-2023-global-cyberattacks\/\" target=\"_blank\" rel=\"noopener\">originate from unmanaged devices on the network<\/a>, although some start on under protected machines that lack the defenses needed to stop attackers getting onto the device.<\/p>\n<h2>Why is remote ransomware so prevalent?<\/h2>\n<p>A key factor driving the widespread use of this approach is its scalability: A single unmanaged or under-protected endpoint can expose an organization\u2019s entire estate to malicious remote encryption, even if all the other devices are running a next-gen endpoint security solution.<\/p>\n<p>To make matters worse, adversaries are not limited in their choice of ransomware variant for these attacks. A wide range of well-known ransomware families support remote malicious encryption, including Akira, BitPaymer, BlackCat, BlackMatter, Conti, Crytox, DarkSide, Dharma, LockBit, MedusaLocker, Phobos, Royal, Ryuk, and WannaCry.<\/p>\n<p>Furthermore, most endpoint security products are ineffective in this scenario because they focus on detecting malicious ransomware files and processes <em>on the protected endpoint<\/em>. However, with remote encryption attacks, the processes run on the compromised machine, leaving the endpoint protection blind to the malicious activity.<\/p>\n<p>Fortunately, Sophos Endpoint includes robust protection against malicious remote encryption, powered by our industry-leading CryptoGuard protection.<\/p>\n<h2>Sophos CryptoGuard: Industry-leading, universal ransomware protection<\/h2>\n<p>Sophos Endpoint contains multiple layers of protection that defend organizations from ransomware, including CryptoGuard, our unique anti-ransomware technology that is included in all Sophos Endpoint subscriptions.<\/p>\n<div class=\"embed-vimeo\" style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/889667454\" width=\"100%\" height=\"420\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen style=\"\"><\/iframe><\/div>\n<p>Unlike other endpoint security solutions that solely look for malicious files and processes, CryptoGuard analyzes data files for signs of malicious encryption irrespective of where the processes are running. This approach makes it highly effective at stopping all forms of ransomware, including malicious remote encryption. If it detects malicious encryption, CryptoGuard automatically blocks the activity and rolls back files to their unencrypted states.<\/p>\n<p>CryptoGuard actively examines the content of all documents as files are read and written, using mathematical analysis to determine whether they have become encrypted. This universal approach is unique in the industry and enables Sophos Endpoint to stop ransomware attacks that other solutions miss, including remote attacks and never-before-seen ransomware variants.<\/p>\n<p><strong>Detects malicious encryption by analyzing file content<br \/> <\/strong>Unlike other solutions that look at ransomware from an anti-malware perspective by focusing on detecting malicious code, CryptoGuard looks for mass rapid encryption of files by analyzing content using mathematical algorithms.<\/p>\n<p><strong>Blocks both local and remote ransomware attacks<br \/> <\/strong>Because CryptoGuard focuses on the content of files, it can detect ransomware encryption attempts even when the malicious process is not running on the victim\u2019s device.<\/p>\n<p><strong>Automatically rolls back malicious encryption<br \/> <\/strong>CryptoGuard creates temporary backups of modified files and automatically rolls back changes when it detects mass encryption. Sophos uses a proprietary approach, unlike other solutions that use Windows Volume Shadow Copy, which adversaries are known to circumvent. There are no limits to the size and type of file that can be recovered, minimizing the impact on business productivity.<strong><br \/> <\/strong><\/p>\n<p><strong>Automatically blocks remote devices<br \/> <\/strong>In a remote ransomware attack, CryptoGuard automatically blocks the IP address of the remote device attempting to encrypt files on the victim\u2019s machine.<\/p>\n<p><strong>Protects the master boot record (MBR)<br \/> <\/strong>CryptoGuard also protects the device from ransomware that encrypts the master boot record (preventing startup) and from attacks that wipe the hard disk.<\/p>\n<p>CryptoGuard is one of the unique capabilities in Sophos Endpoint and is included with all Sophos Intercept X Advanced, Sophos XDR, and Sophos MDR subscriptions. What\u2019s more, the capability is enabled automatically by default, ensuring organizations enjoy full protection from both local and remote ransomware attacks straight away \u2013 no fine tuning or configuration required.<\/p>\n<h2>Discover unprotected devices<\/h2>\n<p>A single unprotected endpoint can leave your organization vulnerable to a remote encryption attack. Deploying Sophos Endpoint provides robust universal ransomware protection from malicious encryption. But how can you identify if you have unprotected devices on your network in the first place?<\/p>\n<p>This is where <a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-detection-and-response\/network-detection-and-response\">Sophos Network Detection and Response (NDR)<\/a> can help. Sophos NDR monitors network traffic for suspicious flows and, in doing so, identifies unprotected devices and rogue assets in the environment.<\/p>\n<p><strong>For the strongest protection against remote ransomware attacks, install Sophos Endpoint on all machines in the environment and deploy Sophos NDR to discover unprotected devices on your network.<\/strong><\/p>\n<h2>Elevate your protection against remote ransomware today<\/h2>\n<p>Malicious remote encryption is a popular ransomware technique that most leading endpoint security solutions struggle to stop. If you\u2019re not using Sophos Endpoint, there\u2019s a high chance you\u2019re exposed.<\/p>\n<p>To learn more about <a href=\"https:\/\/www.sophos.com\/en-us\/products\/endpoint-antivirus\/xdr\">Sophos Endpoint<\/a> and how it can help your organization better defend against today\u2019s advanced attacks, including remote ransomware, speak with a Sophos adviser or your Sophos partner today. You can also take it for a test drive in your own environment with a no-obligation 30-day free trial.<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/12\/07\/sophos-endpoint-industry-leading-protection-against-remote-ransomware-attacks\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2023\/02\/Endpoint.png\"\/><\/p>\n<p><strong>Credit to Author: Sally Adam| Date: Thu, 07 Dec 2023 10:25:16 +0000<\/strong><\/p>\n<p>Most leading endpoint solutions struggle to stop malicious remote encryption, but not Sophos.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[11179,129,10405,24562,3765,30585],"class_list":["post-23544","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-endpoint","tag-featured","tag-intercept-x","tag-products-services","tag-ransomware","tag-remote-ransomware"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23544"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23544\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23544"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}