Only Network Analytics Stops WannaCry

Only Network Analytics Stops WannaCry

The recent WannaCry ransomware outbreak was a credible indicator of how ill-prepared the world is for a cyberattack.

WannaCry was not a particularly sophisticated malware worm, yet once the initial infection took place it spread quickly to over 300,000 machines in 160 countries.

Even though early warning indicators of the attack were present it easily got past conventional network perimeters and diffused so quickly that human security teams were unable to contain it. Only through the accidental bumbling around by a junior security researcher who inadvertently discovered a kill switch, were we able to shut the thing down.

Next time, we won’t be that lucky.

Today, thanks in part to the NSA, Wikileaks and Shadow Brokers, the world has easy access to cheap, sophisticated, and fast-moving malware. The dark web and underground marketplaces provide ready-made and subscription-based malware as a service that for a few bucks, amateur cyber-criminals can leverage to commit extortion and ransom attacks on businesses and institutions of every size, shape and form.

There are even live chat support and 24x7 customer service lines.

Owing to all this, cyber-criminals launched 640 million ransomware attacks last year which generated over a billion dollars in revenue. Those attacks were not driven by conventional forms of subterfuge like phishing. Most of them were designed with metamorphic malware at their core which is able to self-modify and evade any conventional perimeter defense tools and most legacy end-point detection systems.

The world of cybersecurity defense has changed dramatically just in the last 24 months. Modern malware is now almost exclusively polymorphic and designed in such a way as to spread immediately upon intrusion into a network, infecting every sub-net and system it encounters in near real-time speed.

Effective defense systems have to be able to respond to these threats in real time and take on an active reconnaissance posture to seek out these attacks during the infiltration phase.

We now have defense systems that have applied artificial intelligence and advanced machine learning techniques and are able to detect and eradicate these new forms of malware before they become fully capable of executing a breach, but ...

... their adoption has not matched the early expectations.

As of today, the vast majority of businesses and institutions have not adopted nor installed these systems and they remain at high risk. The risk is exacerbated further by targets that are increasingly involved with life or death outcomes like hospitals and medical centers. All of the new forms of ransomware and extortionware will increasingly be aimed at high-leverage opportunities like insulin pumps, defibrillators, drug delivery systems and operating room robotics.

What used to be concerns over a locked down accounting system awaiting the payment of a ransom has now given away to the reality of much larger payments expected in exchange for the release of a captive pacemaker, medical scanner and other life-sustaining devices and networks.

During the WannaCry attacks, hospitals had to turn away patients, and their ability to provide care was altered significantly. Even though the threat is widely acknowledged to be real by the information security community and anyone not living under a rock, and the stakes are higher than ever, most organizations and almost all healthcare providers are still using old-school cybersecurity technologies and retain their reactive security postures.

The WannaCry ransomware attack moved too quickly for security teams to respond, but a few organizations were able to spot the early indicators of the ransomware and contain it before the infection spread across their networks. While it wreaked havoc across the globe, there was nothing subtle about it. All of the signs of highly abnormal behavior on the networks were there, but the pace of the attack was far beyond the capacity of human teams contain it.The latest generation of AI technology enabled those few organizations to defend their networks at the first sign of threat.

Network behavioral analytics that leverage artificial intelligence can stop malware like WannaCry and all of its strains before it can form into a breach. And new strains are coming. In fact, by the time this is published, it would not surprise me to see a similar attack in the headlines.

Yesterday would have been a good time for companies and institutions to arm themselves against this pandemic. Tomorrow will be too late.

要查看或添加评论,请登录

Steve King, CISM, CISSP的更多文章

  • Connected Device Security: A Growing Threat

    Connected Device Security: A Growing Threat

    Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have…

    3 条评论
  • China’s Ticking Time-Bomb.

    China’s Ticking Time-Bomb.

    It should now be clear to even the casual observer that China has been spying on us for years and stealing reams of…

    7 条评论
  • Comparing Major Crises To COVID-19: A Teachable Moment

    Comparing Major Crises To COVID-19: A Teachable Moment

    Lessons from past financial crises might prepare us for the long and short-term effects of COVID-19 on the economy and…

  • The Escalating Cyber-Threat From China

    The Escalating Cyber-Threat From China

    A Modern-day Munich Agreement In an article penned back in May of 2015 in a policy brief published by the Harvard…

    1 条评论
  • Cybersecurity: Past, present, future.

    Cybersecurity: Past, present, future.

    We have made a flawed assumption about cybersecurity and based on that assumption we have been investing heavily on…

    15 条评论
  • Three Marketing Tips for Improved Conversion Rates

    Three Marketing Tips for Improved Conversion Rates

    While we are all devastated to one degree or another by this outbreak and with the knowledge that it will likely change…

  • Coronavirus in the Dark.

    Coronavirus in the Dark.

    So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor panic leading to a…

    13 条评论
  • Panicky Investors Issue Dire Warning On Coronavirus

    Panicky Investors Issue Dire Warning On Coronavirus

    Sequoia Capital just issued a dire warning to its portfolio companies. “Coronavirus is the black swan of 2020.

    5 条评论
  • AI in Cybersecurity? Closing In.

    AI in Cybersecurity? Closing In.

    "AI Needs to Understand How the World Actually Works" On Wednesday, February 26th, Clearview AI, a startup that…

    8 条评论
  • Do CapitalOne Shareholders Have a Case Against AWS?

    Do CapitalOne Shareholders Have a Case Against AWS?

    An adhesion contract (also called a "standard form contract" or a "boilerplate contract") is a contract drafted by one…

    1 条评论

社区洞察

其他会员也浏览了