Ransomware vs Microsoft Defender for Endpoint: A Behavioural Analysis (2024)

Author: Curtis S. , Security Analyst

The broad definition of ransomware is when a hacker takes control of your data and prevents you from accessing it. Your files are only returned when you pay the ransom demand.

There are many categories of ransomware, including the following common examples:

  • Crypto ransomware: This is the most common type of ransomware. This type encrypts files and makes them accessible only with a decryption key. It is often spread via emails and websites.
  • Scareware: With this type of ransomware, a user is tricked into thinking a virus is present with multiple pop-ups and “urgent” messages. To fix the presumed issue, users are directed to pay, or click on something that deploys even more damaging ransomware.
  • Locker ransomware: Appropriately named, this type of ransomware is when the user is completely locked out of their applications. There is often a ransom payment demand along with a deceiving message making the user feel like they have done something wrong.
  • Ransomware as a Service: RaaS is a delivery method for ransomware. Any amateur bad actor can subscribe to RaaS so they can easily execute ransomware. But the RaaS provider is a professional hacker that will manage the details including dark web distribution, payment collection, access restoration, and more.

Within these categories are hundreds of ransomware programs. Curtis Slade, a Security Analyst at Bulletproof, has taken the top 30 ransomware programs and executed them in a controlled sandbox environment. A sandbox environment is an isolated testing environment that does not impact the network or platform. This environment was running a fully updated Microsoft Defender for Endpoint.

Putting Microsoft Defender for Endpoint to the Test

Microsoft Defender for Endpoint is a security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

The endpoint behavioral sensors collect and process signals from the operating system and send it to Microsoft Defender for Endpoint. These signals are then translated into insights, detections, and recommended responses to advanced threats.

Ransomware vs Microsoft Defender for Endpoint: A Behavioural Analysis (1)

The Test

When Curtis Slade set out to test the detection and response capabilities of Defender, he used the following ransomware samples:

Ransomware vs Microsoft Defender for Endpoint: A Behavioural Analysis (2)

Curtis began by extracting samples from password protected ZIP files to the filesystem of the sandbox environment to see if Defender would detect when the file was written to the system. The following methodology was employed to ensure the testing process was thorough:

Recommended by LinkedIn

Exclusive! Analysis of 3 Ransomware Threats Active… Cyber Security News ® 2 months ago
Keeping your data protected from ransomware attack in… ITC Infotech 11 months ago
The Growing Threat of Ransomware: Strategies for… Faysal A. Ghauri 2 months ago

  1. If the file is detected by Defender, then is it allowed or whitelisted on the system to further execute?
  2. Upon execution, will Defender detect the running process on the system and allow it to run or is it further quarantined?
  3. Was every effort made to allow or whitelist the process on the system to see if it would further encrypt the filesystem?
  4. Sometimes a reboot of the infected host is required to further test persistence mechanisms within the ransomware to see if encryption will take place.

The Results

Microsoft Defender for Endpoint had 100 percent protection coverage of all 30 ransomware samples. It protected the endpoint in at least one of three main stages of the attack, which exemplifies its strength against one of the most common and devastating attacks threatening businesses today.

If we’re also looking at the attack stages, Defender performs the way we would want it to perform—by detecting it better in the earliest stages.

Defender had almost a perfect detection rate when the ransomware was successfully executed on the filesystem (29/30). This is the critical point where we want to detect the malware before it even gets to execute.

Malware/ransomware developers are getting smarter, and there are now ways to get malware to execute without ever writing to the filesystem. Historically, ransomware developers and their RaaS business model are not interested in advanced techniques as most look for a simple way to gain access, hit the system, and get paid approach. This model has been extremely effective to date, unfortunately, but if businesses are protected with endpoint products like Defender that are successfully stopping their attacks, they’ll see the need to advance their software.

Almost half of the ransomware that was ‘forced’ to execute, still did not encrypt the filesystem—this was impressive. As described in the methodology, Defender has to be strongly encouraged to accept the suspect files to be allowed to execute, let alone get to the point where it’s allowed to run on the system and encrypt the files. Filesystem encryption can be further mitigated by Controlled Folder Access, which helps protect overwriting of important and system folders.

Malware developers have techniques at their disposal to detect when they’re running in a sandboxed or virtual environment. However, most ransomware developers do not resort to advanced malware techniques such as these. They simply do not need to because they’re in it for the quick win.

Protect Your Files with Microsoft Defender for Endpoint

As proven in Curtis’ testing, Microsoft Defender for Endpoint is a valuable component of a cybersecurity solution, certainly when it comes to protecting your files and data against ransomware. With hundreds of ransomware programs ready to encrypt your files, Defender offers peace of mind for threat detection.

As the 2021 Microsoft Global Security Partner of the Year, Bulletproof has the expertise you need to fully understand the benefits and capabilities of Microsoft Defender for Endpoint. Contact us for a consultation on how Microsoft Defender for Endpoint can be integrated with your security software.

Ransomware vs Microsoft Defender for Endpoint: A Behavioural Analysis (2024)
Top Articles
Introducing the 1inch Hardware Wallet
Hands-On Canadian History: The Fur Trade Game
Finance Minor Osu
Layla Deline Leaks
Why Is 365 Market Troy Mi On My Bank Statement
SWIFT/BIC Code for ABN AMRO BANK N.V., Rotterdam
Danielle Ranslow Obituary
Dmitri Wartranslated
Lubbock Avalanche Journal Newspaper Obituaries
Stellaris Piracy Suppression
The Exorcist: Believer Showtimes Near Movie Tavern Brannon Crossing
Www.fresno.courts.ca.gov
GIF by Barstool Sports - Find & Share on GIPHY
Xxc Renegade 1000 Xxc Price In India Price
Knox County 24 Hour List
Caro Walmart Hair Salon
Craigslist Cars Lansing Michigan
Ll94 Pill
Glenpool Fireworks 2023
Becu Turbotax Discount Code
Evo Unblocked
Math-Aids.com Answers
Dynasty League Forum
Harvestella Sprinkler Lvl 2
Waylon Jennings - Songs, Children & Death
Ramsey County Recordease
Https://Www.valottery.com/
Goddess Iah K
Breast epilation in West Allis
Skylarraeexx
Able To Feel Things Figgerits
Becky G Net Worth 2022 Forbes
Amy Riley Electric Video
Veracross Login Bishop Lynch
Craigslist St Paul Mn Cars
Barivel Weight
Texas Gov Ecommdirect Con
Super Vote Top Wish Trisha Yearwood’s Birthday Tour Hit On Country Jams Songs For Her Music
Craislist Vt
Bistró Cuban Cafe Reviews
Optum Primary Care - Winter Park Aloma
Haunted Mansion (2023) | Rotten Tomatoes
Optum Primary Care - Winter Park Aloma
Chinese cargo cranes at U.S. ports pose espionage risk, probe finds
Bridger Elementary Logan
He bought a cruise ship on Craigslist and spent over $1 million restoring it. Then his dream sank
3rd Age Felling Axe / Third Age Felling Axe [High Level Delivery!... | ID 217153061 | PlayerAuctions
Deleon Malik Taylor-Griffin
What Is Njvpdi
Babbitts Polaris Partshouse
Lowes.com Usa
Violent Night Showtimes Near Mjr Universal Grand Cinema 16
Latest Posts
Article information

Author: Kelle Weber

Last Updated:

Views: 6013

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Kelle Weber

Birthday: 2000-08-05

Address: 6796 Juan Square, Markfort, MN 58988

Phone: +8215934114615

Job: Hospitality Director

Hobby: tabletop games, Foreign language learning, Leather crafting, Horseback riding, Swimming, Knapping, Handball

Introduction: My name is Kelle Weber, I am a magnificent, enchanting, fair, joyous, light, determined, joyous person who loves writing and wants to share my knowledge and understanding with you.