Menu
Menu
14 steps to avoid WannaCry ransomware attack: ICIT

14 steps to avoid WannaCry ransomware attack: ICIT

ICIT suggests a ‘layered defense strategy’ to minimise exposure and thwart ransomware infection

In the wake of the global WannaCry ransomware attack, the Institute for Critical Infrastructure Technology (ICIT) has released a 14-point plan that calls on organisations to practice comprehensive cyber-hygiene, and modernise systems and applications to limit reliance on out-of-support programs.

Those are two of the steps outlined in ICIT’s detailed plan, entitled “Recommendations for Preventing Ransomware Exploitation,” which suggests organisations take ‘a layered defense strategy’ in order to minimise exposure and thwart ransomware infection.

“Since the WannaCryptor ransomware attack, also known as WannaCry or Wcrypt, began wreaking havoc around the globe, ICIT has received a flood of inquiries from policymakers, governments, and the private sector on how organisations can defend themselves,” said ICIT senior fellow, James Scott.

ICIT’s 14-point plan suggests organisations:

1) Practice comprehensive cyber-hygiene


1.Do not follow suspicious links or open attachments from unknown contacts.

2.Rely on complex and memorable account credentials.

3. Deploy privacy protections under the settings page of social media accounts.

4. Hover the cursor over a link prior to clicking to ensure that the URL matches the hyperlink.

5. Install ad-blocker and do not track browser extensions, such as AdBlock and DoNotTrack.

2) Remain Current on Patches and Updates for Operating Systems and Applications


1. Often, applications can be configured to automatically update.


3) Modernise systems and applications to limit reliance on out-of-support programs


1.Antiquated systems are insecure and increasingly demand more resources to protect.

2.When possible, invest in reliable modern technology and applications. However, in order to avoid being a “technological crash-test dummy”, wait a few months before adopting brand new operating systems and technologies. Once the first few rounds of patches have been issued, the systems should be safer.

This caveat is necessitated by manufacturers’ continued refusal to incorporate security-by-design throughout the developmental lifecycle of products and services.


4) Regularly Back-Up systems and create restore points, preferably on multiple media

1. At least one backup medium should be an external system/ storage device

2. Windows includes the option to create System Restore Points from which the user can backup and restore their PC. While sophisticated ransomware wipe restore points, many unsophisticated ransomware do not. To restore from a restore point, the user can boot the computer in safe mode from the boot menu (typically pressing ESC at the Windows logo during startup).

3. Backup Individual Files:Copy important individual files onto external devices, via cloud storage, or email them to yourself using trusted and secure accounts.

4. Backup the entire PC.

A) Right-click the Start button
B) Select Control Panel, then System and Maintenance, and then Backup and Restore
C) Do not back-up files to the same partition (i.e. C drive) that Windows is installed on. Use the secondary partition (i.e. D drive) or an external device.
D) If you have never used Windows Backup, or if you have recently upgraded your version of Windows, Select Set up backup

Afterward, Windows will regularly and automatically backup the system at user-specified intervals. Otherwise, choose either Back-up now or Create new, full backup

5) Create a System Image

1. System images are a snapshot of all the files and applications on a system at a particular time.
2. Right-click the Start button
3. Select Control Panel, then System and Maintenance, and then Backup and Restore
4. Choose Create a system image in the left pane

6) Create a Restore Point

1. Click the Start button
2. Select Control Panel, then System and Maintenance, and then System
3. Navigate to System Protection in the left pane
4. Click the System Protection tab and select Create

7) To Restore the System to that Point:

1. Right-click the Start button
2. Select Control Panel, then System and Maintenance, and then Backup and Restore
3. Select Restore my files
4. Additional details on system restore and backup available at: https://support.microsoft.com/en-us/help/17127/windows-back-up-restore

8) Install Anti-Malware (keep it current) and Configure Firewall Rules according to a whitelist

1. Anti-malware applications are programs that automatically monitor user PCs, prevent compromises, and remove infections.
2. Popular consumer anti-malware applications include: Malwarebytes, Trend Micro, McAfee, Norton, etc. Many applications can be configured to monitor the user system in real-time and to automatically scan the system at predetermined intervals.
3. A Firewall whitelist is a list of allowed traffic according to preapproved type or the origin (person, network, site, etc.). All other traffic is blocked by default. YouTube tutorials can help to configure Firewall applications

9) Never Click on links or email attachments from unknown sources/ senders

10) Delete unsolicited email and mark it as spam

11) Do not click on suspicious links, ads, or “click-bait”

12) Employ content scanning and filtering on email and messaging clients, and on browsers

13) Do not connect unknown external storage devices (USB, hard drive, CD, Bluetooth, etc.)

1. In fact, disable auto-run settings on the system. Autorun is the feature of Windows that opens USBs and other devices the second that they are connected. This can lead to the inadvertent spread of malware.

2. To disable auto-run in Windows 7:

A) Click Start
B) Select Run
C) Type “regetit” in the Open box
D) Locate and click the registry entry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\NoE) DriveTypeAutorun
F) Right-click NoDriveTypeAutoRun
G) Click Modify
H) In the Value data box, type 0xFF
I) Click OK and restart the system

3. Procedures to disable autorun in other Windows OS detailed at: https://support.microsoft.com/en-us/help/967715/how-to-disable-the-autorun-functionality-in-windows

4. After Autorun is disabled, connected media can be accessed through the Computer panel on the Start menu, rather than forcing a popup upon connection.

14) If Ransomware infection occurs, Do Not pay the ransom

1. There is limited chances of the attacker actually unlocking the system.

A) Some ransomware, such as the May 2017 WannaCry ransomware, do not even contain decryption mechanisms or technical procedures to identify which victim has paid the ransom.

B) Paying ransoms encourages attackers to broaden their campaigns and it inspires new threat actors to launch additional attacks because the campaigns are seen as profitable.

C) Paying ransoms funds the development of nascent malware and ransomware, it increases the likelihood that others will be victimized by ransomware by encouraging new campaigns, and it may even fund terrorism, cyber-criminal attacks, or adversarial nation-state efforts.

D) Contact proper authorities/ personnel.

E) Restore the system from the latest external backup.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!

Error: Please check your email address.

Tags layered defense strategycyber-hygieneICITCritical Infrastructure TechnologyWannaCry ransomwarecybercrime

More about ClickMalwarebytesMicrosoftNortonTechnologyTrend Micro

Show Comments

Market Place

Computerworld
ARN
Techworld
CMO
<img height="1" width="1" style="border-style:none;" alt="" src="//insight.adsrvr.org/track/evnt/?adv=bitgblf&ct=0:dn998liw&fmt=3"/>