RSI Security

Basics of Cyberattack Remediation

attack

Part of cybersecurity is preparing your organization to deal with the fallout of an attack.

Implementing top-end cybersecurtiy solutions is a great preventative measure, but a cyberattack is often a matter of “when” not “if.”  And in those moments, you will want some form of cyberattack remediation. This article discusses two types, phishing remediation, and malware remediation.

 

What is Cyberattack Remediation?

Most of the work involved in cybersecurity is trying to prevent data breaches from occurring and protecting your organization’s digital assets.

But the reality is sometimes the security measures will fail (or, in the worst case, not be present at all), and you will find yourself amidst a data breach. A vitally important aspect of cybersecurity is dealing with data breaches; this is what we refer to as cyberattack remediation.

Essentially, the objective of your organization during the remediation phase is to limit or outright stop the effects of a security breach.

The remediation process can vary between incident and organization. Some will take the approach of “kill it till it stops,” shutting down or destroying affected systems to stop the spread of the breach.

In some cases, this might be the appropriate response. However, with a well-defined remediation process, you might still be able to save affected systems without having to use the nuclear option.

And it all starts with an Incident Response Plan (IRP).

 

Incident Response Planning (IRP)

You will see a common theme among all attack remediations mentioned in this article: incident response planning.

Having an IRP is the first step to a successful remediation process. It will help identify, before a breach, your existing gaps in security, where attacks are likely to come from, and steps to take during a security event.

Be sure to read this blog post to get you up to speed on the basics of incident response planning.

In brief, an IRP will get you prepared for a breach by:

However, remediation is not limited to just an IRP. Some unique attacks will require unique solutions. In the following sections, we will explore some special attacks and suggest remediation processes for each.

 

Schedule a Free Consultation!

 

Phishing Attacks

Phishing attacks are on the rise, and according to this report by Verizon, 32% of breaches involved phishing (2019). In the same report, Verizon stated that 94% of Malware was delivered via email, making email phishing one of the most critical types of phishing to guard against.

What Are Phishing Attacks?

The statistics might be frightening, but knowing your enemy is the first step in stopping their attacks. Phishing is a cyberattack that involves baiting the victim into downloading a malicious file or clicking on a malicious link (essentially, getting the victim to take action that favors the attacker).

This description is the basic concept of a phishing attack. However, the delivery of a phishing attack can vary in sophistication and type.

Here are three common types of phishing attacks you can expect to see:

Social engineering, the umbrella of which phishing falls under, is a complex beast to navigate and should be treated as a threat all on its own.

One of the most infamous cases of phishing was operation “phish phry.” The Federal Bureau of Investigation (FBI) stopped a phishing operation of epic proportions. The FBI quoted that over $1.5 Million was stolen from victims of the attack and funneled to bogus bank accounts worldwide.

The attack targeted US banks and bank account holders, where attackers stole their financial information via email phishing.

 

Phishing Remediation

It is always best for your organization to have a system in place for your employees to flag potential phishing attacks. With the proper security awareness training, over time, they will become better at discovering phishing attempts that should drastically reduce your organization’s chance of becoming a victim of these types of attacks.

However, there will be moments where more sophisticated attacks will slip through the security net, which is when you should execute the remediation processes.

As discussed in the introduction, an incident response plan is vital here. This plan should include methods to remediate phishing attacks. There is no one solution, and remediation will have to cover a few scenarios, but that’s why planning is essential.

Some processes you will want to include (both before an attack and after):

Malware Attacks

Malware attacks vary drastically in scope and effectiveness. Malware is short for malicious software created by attackers; the software is designed to infiltrate information systems and install undetected.

Once installed, the attacker can execute the software to fulfill its nefarious purpose, which its creator ultimately decides.

Defining all types of malware would be like naming all the bees in a hive, impractical. However, there are some commonly seen types of malware that you might already be familiar with:

 

Wannacry Ransomware attack

The Wannacry ransomware attack is one of the most infamous examples of this type of Malware. If you Google “ransomware,” you will almost certainly come across this image here:

Image Source: Wikipedia, Wannacry Article.

The Malware infected computers, encrypted all files on the system, and requested a Bitcoin payment to unlock the affected system. The virus targeted devices with the Microsoft operating system installed.

Some of the victims of the attack included the National Health Service (NHS), which is the public healthcare organization of the United Kingdom (infecting all sorts of devices from computer systems to MRI Scanners).

The US and UK governments claimed that North Korea was responsible for the attacks. If there was an upside to the attack, many people got a crash course on cryptocurrency and how to buy Bitcoin (thoughtful attackers indeed, who knows they may have inadvertently created millionaires).

 

Malware Remediation

Malware remediation can be a tricky path to map. Between the amount and complexity of malware, some organizations are hard-pressed when it comes to malware remediation.

However, malware remediation starts with malware defense. Thankfully, cyber defenders are just as clever as cyberattackers. Whatever an attacker creates, you can bet that a defender has made something to counteract it, and if not now, then soon.

Anti-virus is the first line of defense for any network or computer system, a cybersecurity professional’s best friend. The great thing about anti-virus is that they are pretty decent at combating a wide variety of malware.

Generally, attackers will have to code malware to bypass anti-virus, if they even can. Most malware will infect systems that have no anti-virus or anti-virus that is poorly configured.

In cases where the malware has bypassed security measures, you will need to start the remediation processes immediately.

  1. Virus scanning: first things first, scan your computer or network to see if a virus is present; most anti-virus software will come with this feature.
  2. Identify the malware: the second step is to identify the malware. What kind of malware is it? Has it been used in other computer systems? Is it affecting your third-party network? (these kinds of questions are essential for your post-IRP).
  3. Containment: after you have identified the malware, you will need to contain it. This means ensuring it can not spread to other “neighboring” systems. Containment might require you to shut down certain operations, which may slow down productivity, but this is a necessary evil as further infection could cripple your business even more.
  4. Eradication: after the malware has been contained, you will want to eradicate the malware so it is no longer present on any devices or networks. You will have to decide with your security team the best course of action, remembering that the affected system might have to shut down permanently. It is always best to consider how these decisions might affect your operation in the long term.
  5. Clean up: the final step is to clean up the system (delete or recover files) and do a last review to see if any remnants of the malware are present.

 

Enlist The Help Of A Managed Security Service Provider (MSSP)

Sometimes when you fall, you just need someone to help pick you back up, while you brush yourself off, and get back on the saddle.

Cyberattacks are a reality in the modern business environment. In the best of cases, we can avoid them with best-practice cybersecurity. But even with top-shelf solutions, attackers get creative and find a way into your system.

Those are the moments you need remediation. Whether it be phishing remediation or malware remediation, getting help from an MSSP is always recommended.

Leverage their cybersecurity strengths and experience, partner with RSI Security today, and rest easy knowing your security is being taken care of; schedule a consultation here.

 

 


Get A Free Cyber Risk Report

Hackers don’t rest, neither should you. Identify your organization’s cybersecurity weaknesses before hackers do. Upon filling out this brief form you will be contacted by one of our representatives to generate a tailored report.

Exit mobile version