{"id":19803,"date":"2022-08-09T16:10:21","date_gmt":"2022-08-10T00:10:21","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/08\/09\/news-13536\/"},"modified":"2022-08-09T16:10:21","modified_gmt":"2022-08-10T00:10:21","slug":"news-13536","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/08\/09\/news-13536\/","title":{"rendered":"Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR"},"content":{"rendered":"<p><\/p> <p>Most cybersecurity experts agree that having <a href=\"https:\/\/go.malwarebytes.com\/product-demo-series.html\">Endpoint Detection and Response<\/a> software is essential to fighting ransomware today&mdash;but not every EDR is equal.<\/p> <p> <\/p> <p>Businesses, especially small-to-medium sized ones with limited budget or IT resources, need to make sure that their EDR is cost-effective, easy-to-use, and able to reliably<a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/ransomware-rolled-through-business-defenses-in-q2-2022\/\"> stop the growing ransomware threat<\/a>. So precisely what features should SMBs be looking for in an anti-ransomware EDR, and why?<\/p> <p> <\/p> <p>In this post, Robert Zamani, Regional Vice President, Americans Solutions Engineering at Malwarebytes, gives his 6-point checklist of features your EDR should have to stop ransomware.<\/p> <p><strong>Table of contents<\/strong><\/p> <p><strong> <\/strong><\/p> <div class=\"is-layout-flow wp-block-group-is-layout-flow\"><strong><\/strong> <ul> <li><strong><a href=\"#intro\">How should EDR address ransomware?<\/a><\/strong><\/li> <\/ul> <strong> <\/strong> <ol class=\"wp-block-list\"> <li><strong><a href=\"#ep\"> Multi-vector Endpoint Protection (EP) is built-in<\/a><\/strong><\/li> <li><strong><a href=\"#vpm\"> Maintains visibility and patching regularly<\/a><\/strong><\/li> <li><strong><a href=\"#ML\"> Has machine learning (ML) to recognize &lsquo;goodware&rsquo; instead of malware<\/a><\/strong><\/li> <li><strong><a href=\"#mitre\"> Uses standard reference language and forensic analysis<\/a><\/strong><\/li> <li><strong><a href=\"#remediation\"> Thorough containment, eradication, and recovery options<\/a><\/strong><\/li> <li><strong><a href=\"#search\"> Searches for ransomware indicators across all your managed endpoints<\/a><\/strong><\/li> <\/ol> <strong> <\/strong> <ul> <li><strong><a href=\"#more\">More resources<\/a><\/strong><\/li> <\/ul> <strong><\/strong><\/div> <p><strong> <\/strong><\/p> <h2 class=\"wp-block-heading\" id=\"intro\">How should EDR address ransomware?<\/h2> <p> <\/p> <p>At its core, <a href=\"https:\/\/www.malwarebytes.com\/ransomware\">ransomware is an exploitation of trust<\/a>, Zamani says.<\/p> <p> <\/p> <p>&ldquo;We place our trust in applications to perform only the functions we intended, Operating Systems to perform functions we authorized, and that our credentials (user ID\/password) are used only by authorized personnel. Stolen credentials, phishing attacks, zero-day applications, and OS vulnerabilities exploit our trust in endpoints. And since ransomware stems from exploitation of trust, then EDR is not optional when it comes to mitigating a detected threat.&#8221;<\/p> <p> <\/p> <p>A risk management strategy states that we cannot eliminate all system vulnerabilities or block all cyberattacks. In other words, your EDR should be optimized to &ldquo;prevent what you can and mitigate the rest.&rdquo;<\/p> <blockquote> <p>&#8220;Since ransomware stems from exploitation of trust, then EDR is not optional when it comes to mitigating a detected threat.&#8221;<\/p> <p><em>Robert Zamani,&nbsp;Regional Vice President, Americans Solutions Engineering<\/em><\/p> <p><em> <\/em><\/p> <figure><\/figure> <p><em> <\/em><\/p> <\/blockquote> <h2 class=\"wp-block-heading\" id=\"ep\">1. &nbsp; Multi-vector Endpoint Protection (EP) is built-in<\/h2> <p> <\/p> <p>The base functionality of any <a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-edr\">EDR<\/a> is to notify you of any suspicious activity that is taking place on your systems and offer &ldquo;response&rdquo; capabilities to mitigate the detection. However, EDR doesn&rsquo;t inherently do any prevention: It won&rsquo;t stop the threat from breaching your environment in the first place.&nbsp;<\/p> <p> <\/p> <p>Relying solely on EDR as a prevention solution will overwhelm your staff and increase operational costs.<\/p> <p> <\/p> <p>That is why anti-ransomware starts with preventing the known bad, Zamani says. Enter <a href=\"https:\/\/www.malwarebytes.com\/business\/endpoint-protection\">Endpoint Protection<\/a> (EP), an advanced threat prevention solution for endpoints that uses a layered approach with multi-vector detection techniques.<\/p> <p> <\/p> <p>Many EDR vendors will offer EP as a separate offering&mdash;usually, these are just file-based scanners looking for possible clues to malware in binary files. This is the minimal functionality of EP and insufficient because there is more that can be prevented, Zamani says.<\/p> <p> <\/p> <p>EP must reduce the attack surface of ransomware through a combination of comprehensive web protection, application hardening, and other &ldquo;first-layers of defense&rdquo;. Since most ransomware attacks start with a phishing email, this primary &lsquo;preventative&rsquo; type of endpoint protection is essential.<\/p> <p> <\/p> <p>For a budget-friendly way to get the first layer of ransomware protection, look for an EDR with full-stack Endpoint Protection.<\/p> <p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/easset_upload_file73075_225118_e.jpg\" alt=\"\" width=\"1000\" height=\"500\" \/><\/p> <p><em>EP gives you a &ldquo;first-layer of defense&rdquo; against known and unknown malware, ransomware, and other threats.<\/em><\/p> <p> <\/p> <h2 class=\"wp-block-heading\" id=\"vpm\">2. Maintains visibility and patching regularly<\/h2> <p> <\/p> <p>Patching is not just system maintenance, Zamani says. According to the Ponemon Institute, <a href=\"https:\/\/www.cnp.net\/patching-best-practices\/#:~:text=In%20fact%2C%20according%20to%20the,but%20hadn't%20taken%20action.\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">57% of cyberattack victims<\/a> report that their breaches could have been prevented by installing an available patch.&nbsp;<\/p> <p> <\/p> <p>&ldquo;Application and OS vulnerability assessment and patch management solutions are preventative and reduce the ransomware attack surface on endpoints. A good application and OS, vulnerability management solution must automate inventory and severity classification based on CVSS scoring,&rdquo; Zamani says. &ldquo;The sorting by severity and grouping by the asset (endpoint) will allow you to prioritize patching the most valuable endpoints.&rdquo;<\/p> <p> <\/p> <p>In short, make sure your EDR has some sort of <a href=\"https:\/\/www.malwarebytes.com\/cybersecurity\/business\/what-is-patch-management\">vulnerability and patch management component<\/a> to make it more difficult for ransomware attackers to breach your systems.<\/p> <p> <\/p> <h2 class=\"wp-block-heading\" id=\"ML\">3. Has machine learning (ML) to recognize &lsquo;goodware&rsquo; instead of malware<\/h2> <p> <\/p> <p>A good EDR is looking for a deviation from good behavior, Zamani says. When an application launches and performs in an expected way, we call that an example of good behavior&mdash;and when it doesn&rsquo;t, the administrator gets an alert notifying them of suspicious activity warranting investigation.<\/p> <p> <\/p> <p>Contrast this with an ML model trained to recognize &ldquo;bad behavior,&rdquo; where the model finds patterns in datasets of known malware code. On the low side, there are<a href=\"https:\/\/www.statista.com\/statistics\/873097\/malware-attacks-per-year-worldwide\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">&nbsp;tens of billions of unique malware<\/a>, so we can safely assume &ldquo;bad behavior&rdquo; is seemingly endless.<\/p> <p> <\/p> <p>The larger the dataset of bad behavior, the greater the chances of misinterpreting good behavior as bad, leading to many false positives.<\/p> <p> <\/p> <p>&ldquo;Indicators of Compromise (IOC) and Indicators of Attack (IOA) are ill-suited for EDR detections. IOC and IOA define bad, and &lsquo;bad&rsquo; mutates, creating 100s of billions of possibilities,&rdquo; Zamani says. Therefore, a modern EDR heuristics engine must be trained on the good behavior of known-good applications.<\/p> <p> <\/p> <p>Dealing with too many false positives costs time and manpower, distracting you from actual security issues like ransomware. Make sure you choose an EDR that detects deviations from known-good applications to reduce false positives that could distract you in your fight against ransomware.<\/p> <p><\/p> <p><!-- \/wp:post-content --> <!-- wp:heading --><\/p> <h2 id=\"mitre\">4. Uses standard reference language and forensic analysis<\/h2> <p><!-- \/wp:heading --> <!-- wp:paragraph --><\/p> <p>So your EDR has EP and is looking for deviation from known-good behavior to lower false positives&mdash;now, it has sent you a notification of a ransomware threat. The next piece of an anti-ransomware EDR is that the information that comes to you should be standardized both in summary and in detail.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>&ldquo;Traditional, older style EDR will use vendor-specific verbiage for describing the attack,&rdquo; Zamani says. &ldquo;But in your EDR, you want the TTPs (tools, techniques, and procedures) of threats to be described in plain English with a common reference number.&rdquo;<\/p> <p><!-- \/wp:paragraph --> <!-- wp:pullquote {\"style\":{\"border\":{\"radius\":\"0px\"}},\"fontSize\":\"small\"} --><\/p> <figure><\/figure> <p><!-- \/wp:pullquote --> <!-- wp:paragraph --><\/p> <p>The reference number is necessary for documentation purposes, Zamani says. At the same time, the plain-English description is necessary for you to know at what stage an endpoint was ransomed (because a hacker could have exploited a vulnerability in a still-running application).<\/p> <blockquote> <p>&#8220;In your EDR, you want the TTPs (tools, techniques, and procedures) of threats to be described in plain English with a common reference number.&rdquo;<\/p> <p><em>Robert Zamani,&nbsp;Regional Vice President, Americans Solutions Engineering<\/em><\/p> <\/blockquote> <p>To avoid unnecessary complexity in figuring out the origin of a ransomware threat, your EDR solution should have an industry standardized way of describing the attack&mdash;such as<a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> MITRE ATT&amp;CK<\/a> (<a href=\"https:\/\/attack.mitre.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Adversarial Tactics, Techniques, and Common Knowledge<\/a>).<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>&ldquo;Your EDR needs to tell the story of what happened using the standard reference language of<a href=\"https:\/\/attack.mitre.org\/\"> MITRE<\/a> with direct links to the MITRE ATT&amp;CK reference library,&rdquo; Zamani says. &ldquo;It should provide a summary using a Kanban board and a separate process graph with detailed forensics of what and how it happened.&rdquo;<\/p> <p><!-- \/wp:paragraph --> <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/easset_upload_file1039_225118_e.jpg\" alt=\"\" width=\"1000\" height=\"500\" \/><\/p> <p><em>Your EDR should show you alerts that are standardized both in summary and in detail.<\/em><\/p> <p><!-- \/wp:image --> <!-- wp:heading --><\/p> <h2 id=\"remediation\">5. Thorough containment, eradication, and recovery options<\/h2> <p><!-- \/wp:heading --> <!-- wp:paragraph --><\/p> <p>Look to an EDR to mitigate unforeseen threats and ultimately a new method of ransomware (exploitation of trust), says Zamani.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>If one of your endpoints gets infected with ransomware, we want to stop the spread as fast as possible, which<a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"> NIST<\/a> defines as &ldquo;containment&rdquo; in&nbsp;its &ldquo;<a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/specialpublications\/nist.sp.800-61r2.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Computer Security Incident Handling Guide<\/a>.&rdquo;<\/p> <p><!-- \/wp:paragraph --> <!-- wp:pullquote {\"fontSize\":\"small\"} --><\/p> <figure><\/figure> <p><!-- \/wp:pullquote --> <!-- wp:paragraph --><\/p> <p>Containment prevents lateral movement of an attack by allowing you to contain individual machines, processes, or user-IDs and continue active response activities&mdash;making quick and easy containment features a must for your EDR.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>But the fight doesn&rsquo;t stop at containment, says Zamani.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>&ldquo;So you&rsquo;ve contained and studied a threat with your EDR. That&rsquo;s great,&rdquo; says Zamani. &ldquo;But now you want to do remediation. You want to remotely eradicate the ransomware and restore the endpoint to a known-good state free of malware, virus, unwanted programs including unwanted modification.&rdquo;<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>But you may ask:&nbsp;Aren&rsquo;t eradicating and recovering from ransomware the same thing? Not quite, Zamani says.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>&ldquo;Just because you deleted the artifacts does not restore the endpoint into a state where the machine can function. For example, a registry key says the startup sequence is &lsquo;malware first, and then boot.&rsquo; So we remove the nasty registry key &lsquo;malware first&rsquo;, but if you say nothing else, the system won&#8217;t boot!&rdquo;<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>In other words, your EDR needs instrumentation that not only eradicates ransomware but actually recovers and restores the machine&#8217;s state into a functioning state where it can be returned to the network.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>&ldquo;Your ransomware rollback should store changes to data files on the system in a local cache for 72 hours (no ransomware actually exceeds 24 hours), which can be used to help revert changes caused by ransomware,&rdquo; Zamani says.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:heading --><\/p> <h2 id=\"search\">6. Searches for ransomware indicators across all your managed endpoints<\/h2> <p><!-- \/wp:heading --> <!-- wp:paragraph --><\/p> <p>What if you want to see if the same ransomware threat you discovered on one of your endpoints is in the early stages of the attack on other endpoints?<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>&ldquo;Your EDR should have a search engine that can look at any of the TTPs and search across your network,&rdquo; Zamani says. &ldquo;Because you want to see if you can catch something early enough before it hits the point of ransom.&rdquo;<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>Look for an EDR that can <a href=\"https:\/\/service.malwarebytes.com\/hc\/en-us\/articles\/4413789902611-Flight-Recorder-in-Malwarebytes-Nebula\">search data like files, registry, processes, and networking activity<\/a> so you can threat hunt or analyze how a ransomware compromise occurred in your environment.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:heading --><\/p> <h2>Businesses need an EDR that immediately detects and responds to ransomware threats<\/h2> <p><!-- \/wp:heading --> <!-- wp:paragraph --><\/p> <p>In this post, cybersecurity expert Robert Zamani explained the features SMBs should look for in<a href=\"https:\/\/www.malwarebytes.com\/business\/edr\"> an anti-ransomware EDR<\/a> and why.<\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p>Of course, the fight against ransomware doesn&rsquo;t stop at EDR: you still <a href=\"https:\/\/blog.malwarebytes.com\/awareness\/2022\/03\/four-smb-cybersecurity-practices-during-geopolitical-upheaval\/\">good cyber hygiene<\/a> with a well-written and practiced<a href=\"https:\/\/www.malwarebytes.com\/business\/incident-response\"> Incident Response Plan (IRP)<\/a>. Looking to further empower your business in the fight against ransomware?<\/p> <p style=\"text-align: center;\"><span class=\"blue-cta-bttn\" style=\"color: #ffffff;\"><a href=\"https:\/\/try.malwarebytes.com\/defenders-guide-to-ransomware-resilience\/?utm_source=mwb&amp;utm_medium=blog&amp;utm_campaign=edr_post\" style=\"color: #ffffff;\">Read our &#8220;A Defender&#8217;s Guide to Ransomware Resilience&#8221; eBook!<\/a><\/span><\/p> <p style=\"text-align: center;\"><span style=\"color: #ffffff;\"><!-- wp:heading --><\/span><\/p> <h2 id=\"more\">More resources<\/h2> <p><!-- \/wp:heading --> <!-- wp:paragraph --><\/p> <p><a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/08\/ransomware-protection-with-malwarebytes-edr-your-faqs-answered\/\">Ransomware protection with Malwarebytes EDR: Your FAQs, answered!<\/a><\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p><a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/simplifying-the-fight-against-ransomware-an-expert-explains\/\">Simplifying the fight against ransomware: An expert explains<\/a><\/p> <p><!-- \/wp:paragraph --> <!-- wp:paragraph --><\/p> <p><a href=\"https:\/\/blog.malwarebytes.com\/business\/2022\/07\/demo-your-data-has-been-encrypted-stopping-ransomware-attacks-with-malwarebytes-edr\/\">Demo: Your data has been encrypted! Stopping ransomware attacks with Malwarebytes EDR<\/a><\/p> <p><!-- \/wp:paragraph --><\/p><br><a href=\"https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/can-your-edr-handle-a-ransomware-attack-6-point-checklist-for-an-anti-ransomware-edr\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a>","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/business' rel='category tag'>Business<\/a><\/p>\n<p>In this post, a cybersecurity expert gives his 6-point checklist of features your EDR should have to stop ransomware.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/can-your-edr-handle-a-ransomware-attack-6-point-checklist-for-an-anti-ransomware-edr' title='Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/business\/2022\/08\/can-your-edr-handle-a-ransomware-attack-6-point-checklist-for-an-anti-ransomware-edr'>Can your EDR handle a ransomware attack? 6-point checklist for an anti-ransomware EDR<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001],"class_list":["post-19803","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19803"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19803\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}