CISOs Guide To Communicating WNCRY.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

SACM Terminology Nancy Cam-Winget, David Waltermire, March.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Reconnaissance & Enumeration Baseline, Monitor, Detect, Analyze, Respond, & Recover Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009 Santiago,
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Supplied on \web site. on January 10 th, 2008 Reducing Risk Through Incremental Malware Detection January 2008.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Computer Security Keeping you and your computer safe in the digital world.
1. Definition : Malicious code refers to a program that is covertly inserted into another program with the intent to Malicious activities. 2.
Malware Removal Could Be the Toughest Computer Repair Job Computer owners are often shocked at the price of computer repair services to clean up a virus.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
WannaCrypt Ransomeware Customer Guidance
WannaCry/WannaCrypt Ransomware
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Ransomware Guidance For Health Centers
Leverage the Cloud to Minimize the Impact of Ransomware
Ted Allen Rotary May 17, 2017 WannaCry Ransomware Ted Allen Rotary May 17, 2017.
WannaCry/WannaCrypt Ransomware
Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities A brief research note for Info-Tech’s members.
Chapter 6: Securing the Cloud
What they are and how to protect against them
Know About MS Access Database
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Instructor Materials Chapter 7 Network Security
Security Risk Profiles – Tips and Tricks
Secure Yourself from RansomwareWanaCryptor
Trends in Ransomware Distribution
Infrastructure as a Service
Hervey Allen Chris Evans Phil Regnauld September 3 – 4, 2009
Introduction to Networking
Firewalls.
Encryption Ransomware
f
Cybersecurity Awareness
Call AVG Antivirus Support | Fix Your PC
5 ways to keep your work safe and secure
I have many checklists: how do I get started with cyber security?
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Intercept X for Server Early Access Program Sophos Tester
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
WannaCry Ransomware Overview
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
Information Protection
Cybersecurity and Cyberhygiene
Test 3 review FTP & Cybersecurity
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
<offer name> with Microsoft 365 Business Secure Deployment
Information Protection
Cybersecurity Simplified: Ransomware
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

CISOs Guide To Communicating WNCRY

What is it and what happened? WannaCry is Malware, specifically, Ransomware “malicious software which covertly encrypts your files – preventing you from accessing them – then demands payment for their safe recovery. Like most tactics employed in cyberattacks, ransomware attacks can occur after clicking on a phishing link or visiting a compromised website.”   However, WannaCry ransomware deviates from the traditional ransomware definition by including a component that is able to find vulnerable systems on a local network and spread that way as well. This type of malicious software behavior is called a “worm”   Because WannaCry combines two extremely destructive capabilities, it has been far more disruptive and destructive than previous cases of ransomware that we’ve seen over the past 18-24 months. What is it and what happened?

How does a company protect/mitigate the risk Immediate Steps: Ensure MS-17-010 patch is installed on every Windows system, including Windows XP Disable SMBv1, an older version of the SMB protocol, and block port 445 at the perimeter, but test first since this may cause some business interruption. Generally, the SMB protocol does not need to be exposed externally, and is only used internally. Ensure your security program has an understanding of what ports, protocols and services are required for your business to operate, and disable any that are not, especially port 445 Whitelist the WNCRY “kill switch” domains *www[.]iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com *www[.]ifferfsodp9ifjaposdfjhgosurijfaewrwergwea[.]com (remove square brackets [] when whitelisting) How does a company protect/mitigate the risk

How does a company protect/mitigate the risk Secondary Steps: Search our network for files with the .wncry extension to find any encrypted drives that must be recovered from back ups Configure your SIEM or IDS to look for SMB scanning of port 445 in volume. This will also help to determine if your organization was attacked How does a company protect/mitigate the risk

How does a company protect/mitigate the risk Best Practices to Reduce Risk: Implement an ongoing vulnerability management process cycle to identify, prioritize and remediate vulnerabilities, including system configuration, as a cornerstone of your Security Program Segment your networks to stop the spread of infections. Assess data protection, back-up and restoration to ensure that if your data becomes compromised or corrupted, it is easily recoverable. This attack, at a data level, is responded to just like a massive data corruption issue. Follow a standard framework or guideline such as the CIS Critical Security Controls. They are basic to network hygiene. How does a company protect/mitigate the risk

On this slide you explain your current security posture What's our posture?

What implications does this have for our security program This should be used as a teaching tool to implement process rigor and heighten the importance of detection and response. In this case unless prevention was 100% flawlessly executed, organizations were affected. Security programs require focus on all of prevention, detection and response, as well as people, processes and technology. There is no one vendor solution that can plan for outbreaks like this. Use this slide to frame out what changes you are planning and resources you may need. What implications does this have for our security program