Guidelines to handle and respond to ransomware infection
IRM author: CERT SG / Jean-Philippe Teissier
IRM version: 1.0
Preparation
1- A good knowledge of the usual operating systems security policies is needed.
- A good knowledge of the usual users’ profile policies is needed.
- Ensure that the endpoint and perimetric (email gateway, proxy caches) security products are up to date
- Since this threat is often detected by end-users, raise your IT support awareness regarding the ransomware threat
- Make sure to have exhaustive, recent and reliable backups of local and network users’ data
Identification
2General signs of ransomware presence
Several leads might hint that the system could be compromised by ransomware:
-
Odd professional emails (often masquerading as invoices) containing attachments are being received
-
A ransom message explaining that the documents have been encrypted and asking for money is displayed on user’s desktop
-
People are complaining about their files not being available or corrupted on their computers or their network shares with unusual extensions (.abc, .xyz, .aaa, etc..).
-
Numerous files are being modified in a very short period of time on the network shares
Host based identification
- Look for unusual executable binaries in users’ profiles (
%ALLUSERSPROFILE%
or%APPDATA%
) and%SystemDrive%
- Look for the aforementioned extensions or ransom notes
- Capture a memory image of the computer (if possible)
- Look for unusual processes
- Look for unusual email attachment patterns
- Look for unusual network or web browsing activities; especially connections to Tor or I2P IP, Tor gateways (tor2web, etc) or Bitcoin payment websites
Network based identification
- Look for connection patterns to Exploit Kits
- Look for connection patterns to ransomware C&C
- Look for unusual network or web browsing activities; especially connections to Tor or I2P IP, Tor gateways (tor2web, etc) or Bitcoin payment websites
- Look for unusual email attachment patterns
Containment
3- Disconnect all computers that have been detected as compromised from the network
- If you cannot isolate the computer, disconnect/cancel the shared drives (
NET USE x: \\unc\path\ /DELETE
) - Block traffic to identified ransomware’s C&C
- Send the undetected samples to your endpoint security provider
- Send the uncategorized malicious URL, domain names and IP to your perimetric security provider
Remediation
4- Remove the binaries and the related registry entries (if any) from compromised profiles (
%ALLUSERSPROFILE%
or%APPDATA%
) and%SystemDrive%
- If the above step is not possible reimage the computer with a clean install
Recovery
5Objective: Restore the system to normal operations.
- Update antivirus signatures for identified malicious binaries to be blocked
- Ensure that no malicious binaries are present on the systems before reconnecting them
- Ensure that the network traffic is back to normal
- Restore user’s documents from backups
All of these steps shall be made in a step-by-step manner and with technical monitoring.
Aftermath
6Report
An incident report should be written and made available to all of the stakeholders.
The following themes should be described:
- Initial detection.
- Actions and timelines.
- What went right.
- What went wrong.
- Incident cost.
Capitalize
Actions to improve malware and network intrusion detection processes should be defined to capitalize on this experience.