Put On Your Cyber Armor Before Your First Cup
Knights Prepare: In the early Middle Ages, knights spent hours getting ready for battle putting on their armor with the help of a squire. There were hooded coats, trousers, gloves and shoes made of chain mail. Add the helmet, shield, and sword, and they were ready for war.
Cyber Protection: In order to be safe in the cyber world, computer users need to be prepared for the cyber battle that we did not request. We need protection. Here are two examples of attacks and how to defend your home or business.
Ransomware Attacks: To avoid having to pay the ransom for your data held hostage, your organization should be backing up data nightly or more often if operations require. In that case, you will only lose one day’s worth of data plus the time and resources it takes to restore your infected system.
Suncrypt: This happened to Haywood County School District in North Carolina. Their computers were attacked by Suncrypt ransomware. They did not pay the ransom because they had backups, however, they had to delay school for a week to restore everything. Suncrypt uses a Windows admin utility called “PowerShell” to send a file to execute on other computers in order to rename and encrypt every folder on the infected computer. The hackers now have your data hostage.
Could It Have Been Avoided?: What could the school district have done to avoid the infection altogether?
Admin Privileges: First, the person who clicked on the phishing email had “administrative” privileges. Cybersecurity has a concept called “least privilege” where a user has a least amount of privilege to do her work. All internet browsing and email reading should be done as a non-admin user. It is critical to only use admin privileges when performing admin functions (configuration and installation).
Outbound Powershell: Second, the computer security policy allowed the use of outbound PowerShell. The system policy should have disabled outbound PowerShell capability. Powershell is the new favorite of hackers. According to https://news.softpedia.com/news/malware-created-with-microsoft-powershell-is-on-the-rise-503103.shtml eighty-seven percent (87%) of common malware uses PowerShell. This one change to your system can block much of the current malware.
Controlled Folder Access: Finally, for this particular attack, and those like it, the entire attack would have been thwarted if the systems had a simple setting enabled called “Controlled Folder Access.” This feature allows only authorized applications and users to modify folders. This would have completely blocked Suncrypt.
Phishing Attacks: Phishing is getting very complex. There are new targeted phishing campaigns where emails are sent to company users claiming to be from the IT Department. The emails explain that certain sent emails were quarantined and provides a link for the user to login and review the files. The link takes you to a screen that looks exactly like the company login. The hackers grab the user’s credentials when they attempt to login and fix the problem.
Don’t Click It: The lesson here is to always hover over any link. Do NOT click the link without checking it. When you hover over the link, the details of the link show in the bottom left-hand corner of your browser or pops out on your email application. Verify the entire link carefully. Hackers can be creative with their domain names making them similar to the real domain names. So look closely. When it comes to links, hover, hover, and hover again.
Put Your Cyber Armor On: So, along with that first cup of coffee or tea in the morning, remember to put on your cyber armor before you check your emails.