Edit

Share via


Detect and respond to ransomware attacks

Ransomware incidents typically present with distinct warning signs that security teams can identify. Unlike other malware types, ransomware usually produces highly evident indicators that require minimal investigation before declaring an incident. These high-confidence triggers stand in contrast to more subtle threats that would demand extensive analysis before escalation. When ransomware strikes, the evidence is often unmistakable.

In general, such infections are obvious from basic system behavior, the absence of key system or user files, and the demand for ransom. In such cases, the analyst should consider whether to immediately declare and escalate the incident, including taking any automated actions to mitigate the attack.

Detecting ransomware attacks

Microsoft Defender for Cloud provides high-quality threat detection and response capabilities, also called Extended Detection and Response (XDR).

Ensure rapid detection and remediation of common attacks on VMs, SQL Servers, Web applications, and identity.

  • Prioritize Common Entry Points – Ransomware (and other) operators favor Endpoint/Email/Identity + Remote Desktop Protocol (RDP)

    • Integrated XDR - Use integrated Extended Detection and Response (XDR) tools like Microsoft Defender for Cloud to provide high quality alerts and minimize friction and manual steps during response
    • Brute Force - Monitor for brute-force attempts like password spray
  • Monitor for Adversary Disabling Security – Often part of Human-Operated Ransomware (HumOR) attack chain

  • Event Logs Clearing – especially the Security Event log and PowerShell Operational logs

    • Disabling of security tools/controls (associated with some groups)
  • Don't Ignore Commodity Malware - Ransomware attackers regularly purchase access to target organizations from dark markets

  • Integrate outside experts – into processes to supplement expertise, such as the Microsoft Incident Response team (formerly DART/CRSP).

  • Rapidly isolate compromised devices using Defender for Endpoint in on-premises deployment.

Responding to ransomware attacks

Incident declaration

Once a successful ransomware infection is confirmed, the analyst should verify whether it represents a new incident or if it might be related to an existing incident. Look for currently open tickets that indicate similar incidents. If so, update the current incident ticket with new information in the ticketing system. If it is a new incident, an incident should be declared in the relevant ticketing system and escalated to the appropriate teams or providers to contain and mitigate the incident. Be mindful that managing ransomware incidents might require actions taken by multiple IT and security teams. Where possible, ensure that the ticket is clearly identified as a ransomware incident to guide workflow.

Containment/Mitigation

In general, various server/endpoint anti-malware, email anti-malware, and network protection solutions should be configured to automatically contain and mitigate known ransomware. There might be cases, however, where the specific ransomware variant is able to bypass such protections and successfully infect target systems.

Microsoft provides extensive resources to help update your incident response processes on the Top Azure Security Best Practices.

The following are recommended actions to contain or mitigate a declared incident involving ransomware where automated actions taken by anti-malware systems are unsuccessful:

  1. Engage anti-malware vendors through standard support processes
  2. Manually add hashes and other information associated with malware to anti-malware systems
  3. Apply anti-malware vendor updates
  4. Contain affected systems until they can be remediated
  5. Disable compromised accounts
  6. Perform root cause analysis
  7. Apply relevant patches and configuration changes on affected systems
  8. Block ransomware communications using internal and external controls
  9. Purge cached content

Road to recovery

The Microsoft Detection and Response Team help protect you from attacks

Understanding and fixing the fundamental security issues that led to the compromise in the first place should be a priority for ransomware targets.

Integrate outside experts into processes to supplement expertise, such as Microsoft Incident Response. Microsoft Incident Response engages with customers around the world, helping to protect and harden against attacks before they occur, as well as investigating and remediating when an attack has occurred.

Customers can engage our security experts directly from within the Microsoft Defender Portal for timely and accurate response. Experts provide insights needed to better understand the complex threats affecting your organization, from alert inquiries, potentially compromised devices, root cause of a suspicious network connection, to additional threat intelligence regarding ongoing advanced persistent threat campaigns.

Microsoft is ready to assist your company in returning to safe operations.

Microsoft performs hundreds of compromise recoveries and has a tried-and-true methodology. Not only will it get you to a more secure position, it affords you the opportunity to consider your long-term strategy rather than reacting to the situation.

Microsoft provides Rapid Ransomware Recovery services. Under this, assistance is provided in all areas such as restoration of identity services, remediation and hardening and with monitoring deployment to help targets of ransomware attacks to return to normal business in the shortest possible timeframe.

Our Rapid Ransomware Recovery services are treated as "Confidential" for the duration of the engagement. Rapid Ransomware Recovery engagements are exclusively delivered by the Compromise Recovery Security Practice (CRSP) team, part of the Azure Cloud & AI Domain. For more information, you can contact CRSP at Request contact about Azure security.

What's next

See the white paper: Azure defenses for ransomware attack whitepaper.

Other articles in this series: