# Ransomware Prevention

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

Go based Ransomware/Malware

* BlackCat
* RobbinHood
* Nefilim
* EKANS
* Zebrocy - Russian state-sponsored group APT28 created a Go-based version of their Zebrocy malware last year.
* WellMess - Russian state-sponsored group APT29 deployed new upgraded versions of their Go-based WellMess malware last year.
* Godlike12 - A Chinese state-sponsored group deployed Go-based backdoors for attacks on the Tibetan community last year.
* Go Loader - The China-linked Mustang Panda APT deployed a new Go-based loader last year for their attacks.
* GOSH - The infamous Carbanak group deployed a new RAT named GOSH written in Go last August.
* Glupteba - New versions of the Glupteba loader were seen in 2020, more advanced than ever.

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

Nim based Ransomware/Malware

Rust based Ransomware/Malware

* Buer

Dlang based Ransomware/Malware

C

C++

.NET

C#

Java

Objective-c

Python

Perl

Javascript

Powershell

WebAssembly

Delphi

&#x20;

&#x20;

RAT (Remote Access Trojans)

* Cobalstrike
* Remcos
* Nanocore

&#x20;

Crypto Miners

&#x20;

&#x20;

Data exfiltration

* Rclone
* 7zip

&#x20;

Malicious behavior

* deleting backups and logs
* Changing firewall
* Azure Credentials

&#x20;

&#x20;

&#x20;

&#x20;

Which programming languages are hard to reverse engineer

Analyzing ELF files and PE

Win32 API's

&#x20;

&#x20;

References:

<https://unit42.paloaltonetworks.com/blackcat-ransomware/>

<https://www.trendmicro.com/vinfo/us/security/definition/Ransomware>

<https://github.com/redcode-labs/Neurax>

<https://github.com/redcode-labs/Coldfire>

&#x20;

&#x20;

<https://github.com/ponty/pyscreenshot>

&#x20;

&#x20;

&#x20;

&#x20;

Wazuh

\- HIDS

\- OSSEC

&#x20;

&#x20;

MISP

\- Threat Intellegence

&#x20;

Zeek/Suricata/Snort

\- IDS/IPS

&#x20;

PFSense

\- Firewall

&#x20;

&#x20;

&#x20;

Perimeter security logs collected from PFsense and Zeek (span port )

using file beat to forward data to Elkstack(log stash)

&#x20;

&#x20;

AD/DC

\- Winlog Beat

\- Metric Beat

&#x20;

&#x20;

Linux server

\- Audit Beat

\- Metric Beat

\- File Beat

&#x20;

&#x20;

SOAR

\- The Hive

&#x20;

Siemplify

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

SoC Architectures

&#x20;

Log Collection

Log Parsing

Events

&#x20;

Threat Intel (ingest)

&#x20;

Threat detection

Alerts

Threat investigation

Incident Response

&#x20;

Forensics

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

Netflow

&#x20;

&#x20;

Switch spanport -> zeek  ids - different logs

Switch spanport -> suricata -> json (Event.log)

Switch spanport -> Moloch/arkime -> pcap

&#x20;

&#x20;

&#x20;

NSM distribution

* Security onion
* SELKS
* CAPESStack
* HELK
* ROCK NSM

&#x20;

&#x20;

Host Data collections

Event Generation

* OSSEC
* Sysdig for container security
* Windows sysinternals
* * sysmon
* Osquery
* Wazuh

&#x20;

Data Shippers/aggregators

* Beats
* * Filebeat
  * Winlogbeat
  * Audit beat
  * Packetbeat
  * Journalbeat
  * Functionbeat
  * Heartbeat
  * DIY beats

&#x20;

* LogStash
* Nxlog
* Fluentd
* Nifi

&#x20;

SIEM

Graylog

Apache metron

Alien vault

&#x20;

Sigma

Jupyter

&#x20;

&#x20;

Sguil

Evebox

&#x20;

&#x20;

&#x20;

Incident management

TheHive

&#x20;

Sigma

&#x20;

&#x20;&#x20;

Preparation:

* Offline backups availability and integrity check
* Maintain and Audit golden images and build templates
* Use of Infrastructure as a code to deploy images
* Manage IaC in versions for audit purpose
* Storing application source code or executables as backup
* Removing and replacing outdated hardware
* Using multi cloud solutions and maintaining cloud backups, using immutable storage solutions
* Audit cloud environment
* Develop and audit incident response, communication and breach notification plan
* Develop Cyber incident response playbook
* Build and implement Zero  Trust Architecture

&#x20;

Prevention and Mitigating:

* Develop surface discovery plan and audit attack finding
* * Monitor deep web notification/credential monitoring services
* Periodical vulnerability Scans (review CISA Know vulnerability list)
* * External
  * Internal
  * VPN Infra
* Periodical patch management
* Assets security
* * BYOD
  * All devices on hybrid infrastructure
* Protocol, port and service usage metrics
* * RDP
* Have visibility to configuration and change management
* Implement MFA
* Disable weak protocols
* * SMB v 1 and v 2
  * Audit SMB traffic
  * Implement SMB signing and audit
* Blocking external access
* * SMB&#x20;
  * * TCP 445
    * UDP 137
    * UDP 138
    * TCP 139
  * Implement SMB encryption with Universal Naming Convention (UNC) hardening
  * Log and monitor SMB and RDP traffic

&#x20;

Initial Access:

* Implement
* * Phishing resistant MFA and password less MFA
  * IAM
  * PAM
* Change default creds
* Restrict use of root or system admin users s
* Password minimum length and policies
* * Password rotation
  * Password management tools
* Failed login attempts metrics and audit
* Disabling saving passwords to browser using Group Policy
* Local Administrator Password solution (LAPS)
* LSASS : implement attack surface reduction rule
* Windows credential guard
* Use Windows PowerShell Remoting, Remote Credential Guard, or RDP with restricted

Admin Mode

* Separation of admin and user accounts
* Conduct security awareness training
* Email attachments known bad
* Disable office macros
* Disable Windows Script Host (WSH)
* Review malware infections
* * Ex: s QakBot, Bumblebee, and Emotet
* Phishing email metrics and BEC scams
* * How many blocked
  * How many bypassed
* EDR implementation
* * Windows Defender Application Control (WDAC), AppLocker
  * Application allow listing
  * Implement of EDR on cloud
* Threat intel and feed into security stack
* Security awareness training
* Protective DNS
* Sandboxed browsers
* Monitor
* * Seo poisoning
  * Drive by download
  * Malvertising
* Restricting PowerShell usage and alerts

&#x20;

&#x20;

&#x20;

&#x20;

Keywords:

&#x20;

CISA

MSISAC

FBI IC3

NSA

ZTA

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

References:\
&#x20;

download: <https://ofac.treasury.gov/media/912981/download?inline>

Stop Ransomware | CISA: <https://www.cisa.gov/stopransomware>

Cross-Sector Cybersecurity Performance Goals | CISA: <https://www.cisa.gov/cross-sector-cybersecurity-performance-goals>

Public-Power-Cyber-Incident-Response-Playbook.pdf: <https://www.publicpower.org/system/files/documents/Public-Power-Cyber-Incident-Response-Playbook.pdf>

Zero Trust Maturity Model | CISA: <https://www.cisa.gov/zero-trust-maturity-model>

CSI-MITIGATING-CLOUD-VULNERABILITIES\_20200121.PDF: <https://media.defense.gov/2020/Jan/22/2002237484/-1/-1/0/CSI-MITIGATING-CLOUD-VULNERABILITIES_20200121.PDF>

KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS) - Microsoft Support: <https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429>

Overview of Server Message Block signing - Windows Server | Microsoft Learn: <https://learn.microsoft.com/en-us/troubleshoot/windows-server/networking/overview-server-message-block-signing>

Manage Windows Defender Credential Guard (Windows) | Microsoft Learn: <https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/credential-guard-manage>

Exchange Online Protection feature details - Service Descriptions | Microsoft Learn: <https://learn.microsoft.com/en-us/office365/servicedescriptions/exchange-online-protection-service-description/exchange-online-protection-feature-details?tabs=Anti-spam-and-anti-malware-protection>

CISA Insights - Cyber: Enhance Email & Web Security: <https://www.cisa.gov/sites/default/files/publications/CISAInsights-Cyber-EnhanceEmailandWebSecurity_S508C-a.pdf>

How DMARC Advances Email Security: <https://www.cisecurity.org/insights/blog/how-dmarc-advances-email-security>

Malicious Domain Blocking and Reporting (MDBR): <https://www.cisecurity.org/ms-isac/services/%20mdbr>

Macros from the internet are blocked by default in Office - Deploy Office | Microsoft Learn: <https://learn.microsoft.com/en-us/deployoffice/security/internet-macros-blocked>

CSI\_Selecting a Protective DNS Service\_U00117652-21.PDF: <https://media.defense.gov/2021/Mar/03/2002593055/-1/-1/1/CSI_Selecting%20a%20Protective%20DNS%20Service_U00117652-21.PDF>

Microsoft Office 365 Security Recommendations | CISA: <https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-120a>

csi\_keeping\_powershell\_security\_measures\_to\_use\_and\_embrace\_20220622.pdf: <https://media.defense.gov/2022/jun/22/2003021689/-1/-1/1/csi_keeping_powershell_security_measures_to_use_and_embrace_20220622.pdf>

Best Practices for Securing Active Directory | Microsoft Learn: <https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory>

BloodHound, Software S0521 | MITRE ATT\&CK®: <https://attack.mitre.org/versions/v13/software/S0521/>

Securing Active Directory Administrative Groups and Accounts | Microsoft Learn: <https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc700835(v=technet.10)?redirectedfrom=MSDN>

Albert Network Monitoring and Management: <https://www.cisecurity.org/services/albert-network-monitoring>

KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services (AD CS) - Microsoft Support: <https://support.microsoft.com/en-us/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429>

download: <https://ofac.treasury.gov/media/912981/download?inline>

6 Incident Response Steps to Take After a Security Event: <https://www.exabeam.com/incident-response/steps/>

<https://www.malware.us-cert.gov>: <https://www.malware.us-cert.gov/>

Election Security Spotlight – Malware Analysis: <https://www.cisecurity.org/insights/spotlight/cybersecurity-spotlight-malware-analysis>

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;

&#x20;
