{"id":87,"date":"2018-12-11T17:43:00","date_gmt":"2018-12-11T09:43:00","guid":{"rendered":"http:\/\/115.159.161.242\/cn\/?page_id=87"},"modified":"2022-12-28T12:50:26","modified_gmt":"2022-12-28T04:50:26","slug":"anti-ransomware","status":"publish","type":"page","link":"https:\/\/www.cloudfall.cn\/en\/?page_id=87","title":{"rendered":"Anti-Ransomware Solutions"},"content":{"rendered":"\n<div class=\"wp-block-columns has-2-columns is-layout-flex wp-container-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"585\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22-1024x585.jpg\" alt=\"\" class=\"wp-image-4961\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22-1024x585.jpg 1024w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22-600x343.jpg 600w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22-300x171.jpg 300w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22-768x439.jpg 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22-1536x878.jpg 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/04\/\u53cd\u52d2\u7d22.jpg 1575w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><strong>Ransomware<\/strong>, particularly encrypted ransomware, has quickly become one of the biggest cyber threats to organizations around the world. This criminal business model has been proven to generate significant revenue for cybercriminals, in addition to causing significant operational harm to affected organizations. Yet it is mostly irrelevant to the victim, spanning the globe and affecting all major industry verticals. Small organizations, large enterprises, and even individual home users are all potential targets. For decades, ransomware has existed in a myriad of forms. However, over the past few years, criminals have perfected key components of these attacks, which has led to a proliferation of new malware families, making attack techniques more effective and attracting new malicious players to these lucrative schemes.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">Impact<\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">\u2022 The financial impact of ransomware is enormous, with estimates varying, but the total cost in the billions of dollars.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">\u2022\u00a0Ransomware is one of the few cybercriminal business models that can use the same attack to harm Fortune 500 companies, the local restaurant down the street, or your grandmother.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">\u2022\u00a0Bitcoin is the enabler for the success of this scheme. The payment methods that ransom payments relied on in the early days have been shut down or forced to be regulated, but bitcoin is not governed by a central authority and there is no law to act on it.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">\u2022\u00a0Initially, the ransom attack was targeted mainly for windows systems. But adversaries have started to expand their targets to other platforms, such as Mac OSX operating system<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">\u2022\u00a0Unless organizations around the world adopt a precautionary mindset and stop paying ransoms to get their data back, this criminal scheme will continue to threaten all Internet-connected devices.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220514-211235@2x-2560x1034.png\" alt=\"\" class=\"wp-image-5697\" width=\"805\" height=\"325\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-211235@2x-2560x1034.png 2560w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-211235@2x-1500x606.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-211235@2x-768x310.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-211235@2x-1536x620.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-211235@2x-2048x827.png 2048w\" sizes=\"(max-width: 805px) 100vw, 805px\" \/><\/figure><\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<h3 class=\"has-medium-font-size wp-block-heading\" style=\"font-style:normal;font-weight:300\">Preparation<\/h3>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022Backup and recovery: <\/strong>to facilitate successful data recovery after a ransom attack.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022<\/strong> <strong>Network share access control: <\/strong>To stop the spread of ransomware, review the use of network shares to ensure that write access is limited to a minimum number of users and systems.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022\u00a0Information security awareness education: <\/strong>Ransomware is often triggered by emails and clicks on malicious links, and awareness education for corporate employees should be conducted from time to time to reduce ransomware attacks<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">Our email phishing simulation platform can help your business improve overall security awareness.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=77\">\u90ae\u4ef6\u9493\u9c7c\u6a21\u62df\u6f14\u7ec3<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Protection &amp; Detection<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022\u00a0Email and executable controls: <\/strong>Ransomware typically begins with an email message carrying a Windows\u00ae executable file. Network security appliances, such as next-generation firewalls, can identify these files as they traverse the network and can also block or quarantine them.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022\u00a0Unknown malware prevention: <\/strong>Signature-based detection systems used to detect new malware have proven to be unreliable. Unknown malware prevention systems should be used to enhance network security appliances.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022<\/strong> <strong>Endpoint controls: <\/strong>While network-based security devices are sometimes blind to attack events, endpoint-based controls are able to stop the execution of malicious files before they begin.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">Our Managed Security Service Series (MSS) can significantly improve network and endpoint defenses, while also providing significant defense against unknown malware: <\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><a href=\"http:\/\/52.82.126.160\/?page_id=2354\">\u7f51<\/a><a href=\"https:\/\/www.cloudfall.cn\/?page_id=2354\">\u7edc\u5b89\u5168\u6258\u7ba1\u670d\u52a1\uff08MNS\uff09<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=2368\">\u90ae\u4ef6\u5b89\u5168\u6258\u7ba1\u670d\u52a1\uff08MES\uff09<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=36\">\u68c0\u6d4b\u548c\u54cd\u5e94\u670d\u52a1\uff08MDR\uff09<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-11 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=64\">\u6570\u5b57\u5a01\u80c1\u6258\u7ba1\u670d\u52a1\uff08MDT\uff09<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=4676\" data-type=\"page\" data-id=\"4676\">\u4e91\u539f\u751f\u5b89\u5168\u6258\u7ba1\u670d\u52a1\uff08MCNS\uff09<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=4396\">\u5b89\u5168\u8bc4\u4f30\u670d\u52a1\uff08SAS<\/a><a href=\"http:\/\/52.82.126.160\/?page_id=4396\">\uff09<\/a><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"2560\" height=\"1148\" src=\"https:\/\/www.cloudfall.cn\/wp-content\/uploads\/2022\/05\/WX20220514-212419@2x-2560x1148.png\" alt=\"\" class=\"wp-image-5710\" srcset=\"https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-212419@2x-2560x1148.png 2560w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-212419@2x-1500x672.png 1500w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-212419@2x-768x344.png 768w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-212419@2x-1536x689.png 1536w, https:\/\/www.cloudfall.cn\/en\/wp-content\/uploads\/2022\/05\/WX20220514-212419@2x-2048x918.png 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><figcaption>Example: Cloudfall &amp; Microsoft&#8217;s Managed Security Services cover the main stages of the attack chain<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-dots\"\/>\n\n\n\n<p class=\"has-medium-font-size\" style=\"font-style:normal;font-weight:300\">Response<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022\u00a0Understanding the threat:<\/strong> In some cases, security vendors have found ways to decrypt files without going to the ransom payment. You can find some of the information left behind by the ransom in your system or use an intelligent system to identify some of the ransom messages.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\"><strong>\u2022\u00a0Prepare for the worst: <\/strong>Getting your files back by paying a ransom should be a last resort. If you have decided to pay the ransom, you should be prepared to pay in a timely manner.<\/p>\n\n\n\n<p style=\"font-style:normal;font-weight:300\">Our incident response services help organizations minimize risk and loss through a standard classification hierarchy and proven processes for effective security incident response:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=63\">\u5b89\u5168\u65e5\u5fd7\u5206\u6790\u670d\u52a1<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cloudfall.cn\/?page_id=237\">\u5b89\u5168\u4e8b\u4ef6\u54cd\u5e94\u670d\u52a1<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware, particularly encrypted ransomware, has quic [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":84,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/87"}],"collection":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=87"}],"version-history":[{"count":28,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/87\/revisions"}],"predecessor-version":[{"id":6605,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/87\/revisions\/6605"}],"up":[{"embeddable":true,"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=\/wp\/v2\/pages\/84"}],"wp:attachment":[{"href":"https:\/\/www.cloudfall.cn\/en\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}