Another major hospital network experienced a significant ransomware attack that led to the shutdown of several US computing systems. The network’s immediate offline status crippled the hospital’s ability to access labs, radiology records, and other electronic test results required for patient care.
The attack is yet another example that the ransomware epidemic is going nowhere, and if anything, will continue to paralyze and impact critical facilities, networks, and now lives. It is ominous that these attacks generally take on a parallel prescriptive and programmatic approach to one another. The attackers breach the internal network from the outside, using anything from traditional password spraying attacks against RDP to more sophisticated social engineering-based payloads. They then work to move laterally to escalate privileges and finally drive to propagate the ransomware through conduits like PowerShell or PSEXEC. This somewhat predictable approach is our most significant opportunity to improve and reduce the impact of these attacks.
The first step in determining your organization’s risk to ransomware should involve a concentrated focus on the threat. That process starts with threat modeling and then moves into a complete inventory of systems and technologies that can be used as entry points into your network.
The second step is to address tactical risks based on the inventory analysis. As an example, if there are external systems that have remote code execution vulnerabilities on them, your organization should prioritize efforts to remediate those threats.
Step three takes a more strategic approach to ransomware by conducting a ransomware assessment. A strategic ransomware assessment evaluates control categories such as; security awareness, initial infiltration, lateral movement/privilege escalation risks, backups/disaster recovery, and segmentation. The assessment will also identify your organization’s incident response program maturity and preparedness for ransomware attacks.
For organizations needing to act today, there is also a hail mary approach. This approach entails trying to get as much protection against the threat as possible.
This threat is real and is only going to get worse. However, there are things you can do to have a dramatic influence on your ability to prevent or reduce the impact of these attacks.
If you are a security or risk management professional in healthcare, please join CBI’s group of IT healthcare strategists as we openly discuss and unravel the complexities and similarities of attacks for overall healthcare ransomware preparedness. Timing is critical and virtual seats will be limited; please message me directly at shaunb@cbisecure.com to secure a spot. Additional information to come upon the finalization of group members.