The U.S. Cybersecurity and Infrastructure Security Agency’s (CISA) ransomware site US-CERT defines ransomware as: “a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.”

Ransomware attacks from cybercriminals have cost victims many millions of dollars, with one study suggesting the 2020 total cost could ultimately total $1.4 billion in the U.S. Victims of the largest attacks include organizations from every industry, government agencies, IT providers, and educational institutions. No organization is immune, but there are strategies to help ensure your organization is prepared.

 

The U.S. Cybersecurity and Infrastructure Security Agency’s (CISA)
RANSOMWARE PREPAREDNESS

Best practices for ransomware attack recovery

A ransomware attack is one of the worst-case recovery scenarios that organizations can face. An impacted company or agency will likely be dealing with widespread operational and logistical issues caused by the attack. Rubrik has helped a number of customers successfully recover from ransomware attacks. As a result, we developed a set of best practices to help plan for, identify and remediate ransomware attacks. Ransomware attack planning best practices consist of the following five basic steps: 

Preparation

Put yourself in the best position for success by preparing in advance for a ransomware attack.

Prevention

Use third party tools to prevent ransomware from entering and attacking systems. Catch ransomware attacks before they can do damage.

Detection

Apply tools, such as Rubrik Radar, to detect where ransomware has attacked to enable surgical remediation.

Assessment

During an assessment, decide what needs to be recovered first and when.

Recovery

Data can be recovered only after ransomware has been neutralized and blocked from reinfecting data.

Key elements of an effective ransomware recovery plan

If your IT resources are breached by ransomware, you must be ready to address that attack immediately. A ransomware recovery plan should include the following tasks: 

Find the trigger file(s)

First things first: find and remove any trigger file(s) from all devices. 

Determine attack style

Identifying the specific ransomware type will help determine next steps. There are two principal forms of ransomware: screen-locking and encryption-based.

Disconnect all devices

To limit the effects of ransomware, disconnect every vulnerable device from your network in order to block the attack from spreading.

Understand the ransomware

Depending on the type of ransomware attack, data recovery can be possible using web-based software. You might also be able to decode the encrypted files using a ransomware encryption removal tool. Seek guidance from malware experts.

Restore file systems

Ideally, you will want to restore as much “lost” data as possible. That’s done using backed-up data, but be careful. Ransomware can have dwell times as long as six months, so malware might have been included in your archival backups. Before restoring, run an anti-malware package on all systems.

3 ways to prevent ransomware encrypted files

If you are concerned about preventing and recovering from ransomware attacks we recommend the following:

Keep regular backups

Use a dedicated backup service like Rubrik Cloudvault that can quickly be restored

Use strong security measures

Enforce strict IT security policies with all full-time employees, contractors and vendors

Be aware of suspicious emails, links, and attachments

 Phishing is still one of the most popular ways for ransomware to be delivered. Be very wary of any emails or links that come from unknown senders

3 ways to recover from ransomware

If your company has been hit with ransomware, it's important to act quickly and have a plan in place for recovery. Here are three things you can do to help get your business back on track:

  1. Deploy immutable backups - Immutable backups will be your company's best line of defense against ransomware. By having a complete, unalterable backup of your data, you can be confident that you can always revert back to a clean, uninfected copy in the event of an attack.

  2. Enforce strong security measures - Enforcing strict IT security policies will help to prevent ransomware from being able to infect your files and spread throughout your corporate network.

  3. Deploy dedicated backups for high value services - IT services like Microsoft 365, AWS, Azure, and Google Cloud are critical to business operations. Having a dedicated backup solution in place for these services will help ensure that you can quickly and easily recover in the event of an attack.

Recover from ransomware

    Frequently Asked Questions :


RSC Is User Friendly & Easy To Setup

May 23, 2023

Setup and administration of RSC is very straight forward. User friendly administration. I love that they are partnered with Microsoft since we are a Microsoft shop. The dashboards are great and informative.

no-image Sr. Systems Administrator Software
Rubrik Is The Gold Standard

Oct 25, 2022

Can't beat the support and the security of Rubrik Cloud Backup. It's easy to restore files to a particular time. I feel very secure knowing that the data is immutable. Two-factor authentication is great.

no-image Systems Architect Government
Rubrik Security Cloud Is A Fabulous Product

Oct 26, 2022

RSC is a highly scalable, simple to use product that has reduced our backup window by over 50%. It was simple to implement and quick to deploy.

no-image Technical Support Manager Healthcare and Biotech
Implementation Was Quick And Software Updates Quick. Customer Service Exceptional.

Sep 7, 2023

The vendor customer support was top notch from day one and continues to impress me with the interactions. They were able to implement a functional solution to a problem in little time and was able to improve that solution weeks later.

no-image Security Engineer
An Amazing Tool And Team To Have On Your Side

Oct 13, 2022

Rubrik is an amazing tool. It allows us to focus on infrastructure rather than worry about backups. It provides redundancy for all aspects of our system. The UI is very intuitive and working with the tool, support and reps has been amazing.

no-image Infrastructure Administrator IT