{"id":96315,"date":"2021-09-07T09:00:37","date_gmt":"2021-09-07T16:00:37","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=96315"},"modified":"2023-05-15T22:57:20","modified_gmt":"2023-05-16T05:57:20","slug":"3-steps-to-prevent-and-recover-from-ransomware","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/09\/07\/3-steps-to-prevent-and-recover-from-ransomware\/","title":{"rendered":"3 steps to prevent and recover from ransomware"},"content":{"rendered":"

On July 14, 2021, the National Cybersecurity Center of Excellence1<\/sup> (NCCoE) at the National Institute of Standards and Technology2<\/sup> (NIST) hosted a virtual workshop3<\/sup> to seek feedback from government and industry experts on practical approaches to preventing and recovering from ransomware and other destructive cyberattacks. After we wrote up our feedback for NIST, we realized it would be helpful to share this perspective more broadly to help organizations better protect themselves against the rising tide of (highly profitable) ransomware attacks. While ransomware and extortion attacks are still evolving rapidly, we want to share a few critical lessons learned and shed some light on common misconceptions about ransomware attacks.<\/p>\n

Clarifying attack terminology and scope<\/h2>\n

One common misconception about ransomware attacks is that they only involve ransomware\u2014”pay me to get your systems and data back”\u2014but these attacks have actually evolved into general extortion attacks. While ransom is still the main monetization angle, attackers are also stealing sensitive data (yours and your customers\u2019) and threatening to disclose or sell it on the dark web or internet (often while holding onto it for later extortion attempts and future attacks).<\/p>\n

We\u2019re also seeing a widespread perception that ransomware is still constrained to basic cryptolocker style attacks, first seen in 2013, that only affect a single computer at a time (also known as the commodity model). Today\u2019s attackers have evolved far beyond this\u2014using toolkits and sophisticated affiliate business models to enable human operators to target whole organizations, deliberately steal admin credentials, and maximize the threat of business damage to targeted organizations. The ransomware operators often buy login credentials to organizations from other attack groups, rapidly turning what seems like low-priority malware infections into significant business risks.<\/p>\n

Simple, prioritized guidance<\/h2>\n

We\u2019ve also seen that many organizations still struggle with where to start, especially smaller operations with limited staff and experience. We believe all organizations should begin with simple and straightforward prioritization of efforts (three steps) and we have published this, along with why each priority is important.<\/p>\n

\"Microsoft's<\/p>\n

Figure 1: Recommended mitigation prioritization.<\/em><\/p>\n

Create detailed instructions<\/h2>\n

Microsoft has also found that many organizations struggle with the next level of the planning process. As a result, we built guidance to make following these steps as clear and easy as possible. Microsoft already works with NIST NCCoE on several efforts, including the Zero Trust<\/a> effort, which supports Presidential Executive Order (EO) 14028 on Improving the Nation\u2019s Cybersecurity<\/a>. We welcome the opportunity for any additional ransomware-related work by providing clarifying guidance using whatever tools and technologies organizations have available.<\/p>\n

\"Secure<\/p>\n

Figure 2: Secure backup instructions from Microsoft\u2019s human-operated ransomware<\/a> page.<\/em><\/p>\n

Microsoft\u2019s recommended mitigation prioritization<\/h2>\n

Based on our experience with ransomware attacks, we\u2019ve found that prioritization should focus on these three steps: prepare, limit, and prevent. This may seem counterintuitive since most people want to simply prevent an attack and move on. But the unfortunate truth is that we must assume breach (a key Zero Trust principle) and focus on reliably mitigating the most damage first. This prioritization is critical because of the high likelihood of a worst-case scenario with ransomware. While it\u2019s not a pleasant truth to accept, we\u2019re facing creative and motivated human attackers who are adept at finding a way to control the complex real-world environments in which we operate. Against that reality, it\u2019s important to prepare for the worst and establish frameworks to contain and prevent attackers\u2019 abilities to get what they\u2019re after.<\/p>\n

While these priorities should govern what to do first, we encourage organizations to run as many steps in parallel as possible<\/strong> (including pulling quick wins forward from step three whenever you can).<\/p>\n

Step 1. Prepare a recovery plan: Recover without paying<\/h3>\n