Life Cycle of a Ransomware Attack | Pure Storage (2024)

Infection and Distribution Vectors

Ransomware is a type of malware used to encrypt important computer files or sensitive data for ransom. Infections occur when ransomware malware is downloaded and installed on devices across an organization’s network.

Ransomware can gain access to the target system in several ways. In 2023, technological advancements surged. Artificial intelligence and ransomware-as-a-service platforms have streamlined hackers' ability to execute ransomware attacks. Social engineering, state-sponsored, and insider attacks are on the rise, but poor system hygiene and phishing emails remain the most common attack vectors.

Phishing emails typically contain a link to a compromised website or an attachment with malware embedded in it. When the user clicks the link or attachment, the malware is downloaded and executed on the computer system.

Read up on five areas that create common vulnerabilities for ransomware.

Remote Desktop Protocol (RDP) is another common ransomware attack vector because it’s easy to use and can give an attacker high-level access if they’re able to access legitimate credentials. Threat actors can use a variety of techniques, including brute-force attacks, credential stuffing, or purchasing them on the dark web.

Compromised RDP access bought on the dark web can exploit an RDP connection simply by creating a script that scans for the default port. Hackers often have access to the same tools as security professionals and can scan the entire internet for an open port in less than a minute.

Former hacker Hector “Sabu” Monsegur discusses the current cybersecurity landscape and challenges with Pure’s Andrew Miller in this on-demand webinar.

Encryption

Once ransomware is installed on the target system, it lies in wait, silently collecting data and infecting as many systems as it can. It then steals and/or encrypts system files with the company’s most valuable and sensitive data. Ransomware can often destroy backups or steal data as part of the attack too so it’s important your backups are secure and immutable.

Now let’s take a closer look at a few types and variants of ransomware.

Crypto ransomware encrypts files, scrambling the contents and making them unreadable. A decryption key is necessary to restore the files to a readable format. Cybercriminals then issue ransom demands, promising to decrypt data or release the decryption key once demands are met.

Locker ransomware doesn’t encrypt files but completely locks the victim out of their system or device. Cybercriminals then demand a ransom to unlock the device. Generally speaking, it’s possible to recover from or avoid an attempted crypto attack if a good backup is available. However, a locker ransomware attack is harder and more expensive to recover from. Even with backed-up data, the device must be replaced entirely.

The basic objective of a ransomware attack is to extort money, but organizations can refuse to pay, especially when they have a good backup and recovery system in place. For this reason, attackers use double extortion, in which data is both encrypted and extracted. If the company refuses to pay, hackers threaten to leak the information online or sell it to the highest bidder.

And it gets worse. As devastating as double extortionate ransomware sounds, security experts are warning of a bigger threat: triple extortionate ransomware. Attackers demand money from affected third parties, in addition to extracting data and demanding ransom from the initial target.

Lastly, ransomware as a service (RaaS) uses the standard software-as-a-service (SaaS) model. It’s a subscription-based service that gives subscribers access to predeveloped ransomware tools to launch ransomware attacks. Subscribers are referred to as affiliates and earn a percentage of each ransom payment.

Ransom Notes and Demands

Once ransomware has been successfully deployed to the target network, ransom demands are made. Hackers alert the victim that an attack has occurred and details the ransom required to reverse the attack. Ransom demands are displayed on computer screens or left in a note in the directory with the encrypted files.

Ransom requests typically contain details of the ransom amount, the required payment method, and the deadline for payment, as well as a promise to return access to the encrypted files once the ransom has been paid. If data exfiltration has occurred, the hacker may also agree not to expose additional data and show evidence that the data has been destroyed. Payment is usually requested in cryptocurrency (e.g., Bitcoin or Monero).

However, even if a ransom is paid, there’s no guarantee that the attacker will restore data or keep any promises. They may keep a copy of stolen data to use at a later date. Decryption keys may not fully work, leaving some data encrypted, or they may contain additional, undetected malware that the attacker can use in the future.

The Negotiation: To Pay or Not to Pay?

The decision to pay or not to pay a ransom demand can be complicated and depend on several factors:

  • How significant is the impact of the breach on business operations?
  • Will employees be out of work? How many, and for how long?
  • How big is the risk of data exposure?

For a closer look at the pros and cons of paying and not paying, read the blog post “Hit by Ransomware? What to Do Next.”

If your backup and recovery system hasn’t been affected by the ransomware, you may be able to avoid paying the ransom altogether (depending on the type of ransomware affecting you). But if paying the ransom is truly your only option, it’s a good idea to hire an experienced incident response team to assist with negotiations and facilitate payment.

The Aftermath: Restore and Recovery

The average downtime after a ransomware attack is 24 days. If you pay the ransom, it might take several additional days to receive the decryption key and reverse the encryption.

Be aware that some ransomware variants identify and destroy backups on the compromised network. If backups have been destroyed or encrypted, the recovery process can become more complicated. But even if backups are usable, recovery could still be a lengthy process, depending on the type of backup and recovery system you have in place.

Whether you pay the ransom or attempt to recover data yourself, plan for the entire recovery process to take several days. Also plan for some degree of financial loss, whether it comes in the form of ransom payments, incident response costs, or lost revenue due to downtime.

See how the recovery process could vary between two hypothetical organizations with different recovery capabilities in the article “A Tale of Two Ransomware Attacks: Which Company Are You?

Be Ready to Respond to an Attack

A ransomware attack is a risk you can’t afford not to be prepared for. You may think you’re doing all the right things to stay secure, but relying on legacy backup architectures won’t protect you from modern attacks.

The best way to respond to an attack? Only modern solutions like Pure Storage® SafeMode™ Snapshots and FlashBlade//S™ with Rapid Restore, which delivers petabyte recovery performance at scale, can take your security strategy to the next level.

How Ready Are You for a Ransomware Attack?

Take the Free Assessment

Life Cycle of a Ransomware Attack | Pure Storage (2024)

FAQs

What are the 5 stages of ransomware attack? ›

A RansomOps attack happens in multiple stages, which Gartner summarizes as the following: ingress, compromise, burrowing/tunneling, command and control and encryption.

What is the sequence of a ransomware attack? ›

The primary kill chain phases of a ransomware attack are surveillance, distribution, infection, staging, scanning, encryption, and extortion, or the big payday. Once the files are encrypted and a ransom is demanded, your options become limited.

How long does a ransomware attack last? ›

A cyber attack can last from a few days to several months, with the average recovery time after a ransomware attack being around 22 days, but it can vary depending on factors such as encryption type and forensic investigation.

What are the steps in ransomware? ›

5 stages of a ransomware attack
  • Delivery. The network is compromised by a phishing email, exploit or worm.
  • Command and control. Once inside, the ransomware establishes a connection with the attacker's command and control server to receive instructions.
  • Credential access. ...
  • Canvas. ...
  • Extortion.
Sep 7, 2022

What is the 3 2 1 rule for ransomware? ›

3 – Keep three copies of any important file: one primary and two backups. 2 – Keep the files on two different media types to protect against different types of hazards. 1 – Store one copy – or “go bag” – off-site (e.g., outside the home or business facility).

What is the malware lifecycle? ›

Updated on November 10, 2023. Quick Definition: The 6 stages of the cyber attack lifecycle are reconnaissance, weaponization & delivery, exploitation, installation, and command & control.

Which of the following is the correct sequence of the ransomware attack process? ›

Intrusion -> Spread -> Ransom - Intrusion is correctly placed first. - Spread is logically placed after intrusion. - Ransom follows, which is typical. This option does not include theft, which is not necessary for all ransomware attacks.

What is the structure of ransomware attack? ›

How Ransomware Works. In order to be successful, ransomware needs to gain access to a target system, encrypt the files there, and demand a ransom from the victim. Ransomware, like any malware, can gain access to an organization's systems in a number of different ways.

Can you stop a ransomware attack? ›

You can use cloud services to help mitigate a ransomware infection, as many of these services retain previous versions of files that allow you to roll back to an unencrypted version. Be sure to routinely test backups for efficacy.

Can you reverse ransomware? ›

Depending on the type of ransomware attack, data recovery can be possible using web-based software. You might also be able to decode the encrypted files using a ransomware encryption removal tool.

Can I recover files after a ransomware attack? ›

If your files are encrypted by ransomware, you may be able to use a restore point created before the encryption to recover your files.

What is the best backup for ransomware? ›

Ransomware backup strategies
  1. Develop a disaster recovery plan. ...
  2. Keep at least one backup offsite or offline. ...
  3. Store backups in multiple locations. ...
  4. Choose a reasonable backup interval. ...
  5. Regularly perform software updates. ...
  6. Educate employees on backup protocol. ...
  7. Limit employee access to backups. ...
  8. Test backups.

What happens once a ransomware attacks on your system? ›

Ransomware is a type of malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. The first iterations of ransomware used only encryption to prevent victims from accessing their files and systems.

What is the first step after a computer is infected with ransomware? ›

If taking the network temporarily offline is not immediately possible, locate the network cable (e.g., ethernet) and unplug affected devices from the network or remove them from Wi-Fi to contain the infection.

What is the first thing to do in ransomware attack? ›

Responding to a ransomware attack
  • Isolate and contain. Immediately disconnect infected computers and servers from the network. ...
  • Attempt decryption. There are many decryption tools commercially available from anti-virus software manufacturers, some are downloadable for free. ...
  • Install anti-malware software. ...
  • Restore. ...
  • Report.

What is ransomware staging? ›

The staging phase occurs after the attackers have gained initial access to the victim's network but before they encrypt any data. It is the last crucial step before impact. (It's also the last chance for defenders to prevent the final attack.)

What is a common indicator of a ransomware attack? ›

One of the most notable signs of ransomware is the inability to access your files. Additionally, if you notice unauthorized changes to your files, such as unusual file extensions or modified file names, it could be a sign that your computer has been compromised by ransomware.

What is the first step in responding to a ransomware attack? ›

When you suspect you were or are currently under a ransomware attack, establish secure communications with your incident response team immediately. They can perform the following response phases to disrupt the attack and mitigate the damage: Investigation and containment. Eradication and recovery.

Top Articles
What is A Refraction & Is It Covered By Insurance?
The Role of PR in Brand Recognition
Victor Spizzirri Linkedin
Dricxzyoki
Black Gelato Strain Allbud
The Best Classes in WoW War Within - Best Class in 11.0.2 | Dving Guides
Victoria Secret Comenity Easy Pay
What’s the Difference Between Cash Flow and Profit?
Walgreens On Nacogdoches And O'connor
zopiclon | Apotheek.nl
10 Free Employee Handbook Templates in Word & ClickUp
Dutchess Cleaners Boardman Ohio
Sand Castle Parents Guide
Chic Lash Boutique Highland Village
Viprow Golf
9044906381
Dr Adj Redist Cadv Prin Amex Charge
Equipamentos Hospitalares Diversos (Lote 98)
Star Wars: Héros de la Galaxie - le guide des meilleurs personnages en 2024 - Le Blog Allo Paradise
Tvtv.us Duluth Mn
Parent Resources - Padua Franciscan High School
Praew Phat
Apply for a credit card
Nearest Walgreens Or Cvs Near Me
Barber Gym Quantico Hours
Homeaccess.stopandshop
Maxpreps Field Hockey
Lexus Credit Card Login
Ficoforum
Darrell Waltrip Off Road Center
897 W Valley Blvd
Vadoc Gtlvisitme App
Nurofen 400mg Tabletten (24 stuks) | De Online Drogist
Craigslist/Phx
100 Million Naira In Dollars
Solemn Behavior Antonym
Ise-Vm-K9 Eol
Frommer's Philadelphia & the Amish Country (2007) (Frommer's Complete) - PDF Free Download
Beaufort SC Mugshots
814-747-6702
Tableaux, mobilier et objets d'art
Whitney Wisconsin 2022
DL381 Delta Air Lines Estado de vuelo Hoy y Historial 2024 | Trip.com
Headlining Hip Hopper Crossword Clue
Colin Donnell Lpsg
17 of the best things to do in Bozeman, Montana
Craigslist Pet Phoenix
Slug Menace Rs3
Rétrospective 2023 : une année culturelle de renaissances et de mutations
Diesel Technician/Mechanic III - Entry Level - transportation - job employment - craigslist
Strange World Showtimes Near Century Federal Way
Wayward Carbuncle Location
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 5678

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.