{"id":80189,"date":"2018-02-21T09:00:18","date_gmt":"2018-02-21T17:00:18","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=80189"},"modified":"2023-08-03T15:00:54","modified_gmt":"2023-08-03T22:00:54","slug":"how-to-mitigate-rapid-cyberattacks-such-as-petya-and-wannacrypt","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/02\/21\/how-to-mitigate-rapid-cyberattacks-such-as-petya-and-wannacrypt\/","title":{"rendered":"How to mitigate rapid cyberattacks such as Petya and WannaCrypt"},"content":{"rendered":"
In the first blog post<\/a> of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post<\/a>, we provided some details on Petya and how it worked. In this final blog post, we will share:<\/p>\n Because of how critical security hygiene issues have become and how challenging it is for organizations to follow the guidance and the multiple recommended practices, Microsoft is taking a fresh approach to solving them. Microsoft is working actively with NIST, the Center for Internet Security (CIS), DHS NCCIC (formerly US-CERT), industry partners, and the cybersecurity community to jointly develop and publish practical guides on critical hygiene and to implement reference solutions starting with these recommendations on rapid cyberattacks as related to patch management.<\/p>\n We group our mitigation recommendations into four categories based on the effect they have on mitigating risk:<\/p>\n EXPLOIT MITIGATION<\/strong> BUSINESS CONTINUITY \/ DISASTER RECOVERY (BC\/DR)<\/strong> LATERAL TRAVERSAL \/ SECURING PRIVILEGED ACCESS<\/strong> ATTACK SURFACE REDUCTION<\/strong> <\/p>\n Figure 1: Key components of mitigation strategy for rapid cyberattacks<\/em><\/p>\n We recognize every organization has unique challenges and investments in cybersecurity (people and technology) and cannot possibly make every single recommendation a top nor immediate priority. Accordingly, we have broken down the primary (default) recommendations for mitigating rapid cyberattacks into three buckets:<\/p>\n The following list is our primary recommendations on how to mitigate these attacks.<\/p>\n <\/p>\n Figure 2: Microsoft\u2019s primary recommendations for mitigating rapid cyberattacks<\/em><\/p>\n This list has been carefully prioritized based on Microsoft\u2019s direct experience investigating (and helping organizations recover from) these attacks as well as collaboration with numerous industry experts. This is a default set of recommendations and should be tailored to each enterprise based on defenses already in place. You can read more about the details of each recommendation in the slide text and notes of the published slide deck.<\/a><\/p>\n In prioritizing the quick wins for the first 30 days, the primary considerations we used are:<\/p>\n <\/p>\n Figure 3: Mapping each recommendation into the mitigation strategy components<\/em><\/p>\n In addition to the primary recommendations, Microsoft has an additional set of recommendations that could provide significant benefits depending on circumstances of the organization:<\/p>\n There are specific reasons why these 12 recommendations, although helpful for certain organizations\/circumstances, were excluded from the list of primary recommendations. You can read about those reasons in the slide notes of the published slide deck<\/a>\u00a0if interested.<\/p>\n In late November 2017 Microsoft hosted a webinar on this topic and solicited feedback from the attendees which comprised of 845 IT professionals from small organizations to large global enterprises. Here are a few interesting insights from the poll questions.<\/p>\n Rapid cyberattack experience<\/strong><\/p>\n When asked if they had experienced a rapid cyberattack (e.g. WannaCrypt, Petya or other), ~38% stated they did.<\/p>\n Awareness of SPA roadmap<\/strong><\/p>\n When asked if they\u2019re aware of Microsoft\u2019s Securing Privileged Access (SPA) roadmap<\/a>, most, 66%, stated that they were not.<\/p>\n Patching systems<\/strong><\/p>\n When we asked within how many days (<7 or 30 or 90) they can patch various systems, it seems most respondents believed their team is good at patching quickly:<\/p>\n Removal of SMBv1<\/strong><\/p>\n When asked where they are on the path towards removing SMBv1, 26% said they have completed removing it, another 21% said they are in progress or in the process of doing so, and ~18% more are planning to do so.<\/p>\n Adopting roadmap recommendations<\/strong><\/p>\n When asked what is blocking them from adopting Microsoft\u2019s roadmap recommendations for securing against rapid cyberattacks, the top three reasons respondents shared are:<\/p>\n To help organizations overcome these challenges, Microsoft can be engaged to:<\/p>\n Contact your Microsoft Technical Account Manager (TAM) or Account Executive to learn more about how to engage Microsoft for incident response.<\/p>\n We hope you found the 3-part blog series on the topic of rapid cyberattacks and some recommendations on how to mitigate them useful.<\/p>\n For more information and resources on rapid cyber attacks, please visit the additional links here:<\/p>\n On-demand webinar<\/strong> Protect Against Rapid Cyberattacks (Petya, WannaCrypt, and similar)<\/em><\/a>.<\/p>\n Tips to mitigate known rapid cyberattacks with Windows 10<\/strong> (and Windows Defender Advanced Threat Protection):<\/p>\n Mitigate backup destruction by ransomware with Azure Backup security features<\/a><\/p>\n Detect leaked credentials in Azure Active Directory<\/a><\/p>\n Rapidly detect polymorphic and emerging threats and enable advanced protection with Windows Defender Antivirus cloud protection service (formerly Microsoft Active Protection Service (MAPS))<\/a><\/p>\n Apply network protection with Windows Defender Exploit Guard<\/a><\/p>\n Safeguard integrity of privileged accounts that administer and manage IT systems by considering Securing Privileged Access (SPA) roadmap<\/a><\/p>\n\n
Roadmap of prescriptive recommendations for mitigating rapid cyberattacks<\/h2>\n
\nMitigate software vulnerabilities that allow worms and attackers to enter and\/or traverse an environment<\/p>\n
\nRapidly resume business operations after a destructive attack<\/p>\n
\nMitigate ability to traverse (spread) using impersonation and credential theft attacks<\/p>\n
\nReduce critical risk factors across all attack stages (prepare, enter, traverse, execute)<\/p>\n\n
\n
\n
Outside-in perspectives on rapid cyberattacks and mitigation methods<\/h2>\n
\n
\n
\n
\nContact your Microsoft Technical Account Manager (TAM) or Account Executive to learn more about how to engage Microsoft for incident response.<\/li>\n<\/ul>\nMore information<\/h2>\n
Additional resources<\/strong><\/h3>\n
\n