Business IT

Under ransomware DDoS attack? Four tips to help your business navigate

By Raymond Maisano on Aug 20, 2021 2:36PM
Under ransomware DDoS attack? Four tips to help your business navigate

Editor's Picks

5 essential digital transformation ideas

Top 5 Benefits of Managed IT Services

Venom BlackBook Zero 15 Phantom

Facebook, LinkedIn or Instagram? Social media success isn’t one size fits all

It’s Monday morning. Coffee is just kicking in. You’re starting your week and launching your applications and software. But nothing happens.

It’s all systems down. Even your website is offline. Panic. You’re losing money by the minute. If that wasn’t enough, you receive a demand for a ransom to get your systems back up. This is how a ransomware attack works.

It is critical to highlight that ransomware attacks don’t discriminate, and happen regardless of business size or industry. If you think your business is safe, think twice.

Ransomware is not a new concept, but incidents of this nature have drastically increased in the last few months, especially Ransomware DDoS (RDDoS) attacks. How do I know? I work closely with a team that monitors and mitigates this type of attack, and in the past three to six months, we’ve been fighting three to five times the volume of RDDoS attacks we usually would. And Australia isn’t the lucky country in the cyberattack realm, with recent major outages being the consequence of DDoS activity.

So what should a business held to ransom do? Here are some of my tips to help navigate these events.

Newsletter Signup

Get the latest business tech news, reviews and guides delivered to your inbox.

I have read and accept the privacy policy and terms and conditions and by submitting my email address I agree to receive the Business IT newsletter and receive special offers on behalf of Business IT, nextmedia and its valued partners. We will not share your details with third parties.

What’s a RDDoS attack?

Traditional ransomware is a form of malicious software that encrypts files within computers and networks and makes them useless until they are decrypted. They can even damage essential data.

DDoS attacks are attacks where malicious actors unleash a digital swarm of bogus traffic designed to completely take down websites, and potentially internal corporate networks.

A RDDoS attack is the combination of both, where malicious actors takedown systems thanks to an initial DDoS attack, demonstrating their potential to inflict harm, before threatening to launch more attacks and rampaging networks until a ransom is paid. Other malicious actors may also drip feed an attack by requesting ransom in cryptocurrency and slowly take over small parts of your corporate network across a few days - like denied access to your desktop or partially disabling keyboards - before a full scale takeover where anything connected to the internet cannot operate or be resolved during an attack. 

The organisations that are most commonly behind this type of attack are Fancy Lazarus, Fancy Bear, Cozy Bear, the Lazarus Group, and the Armada Collective.

Hackers don’t pick and choose specific businesses to target. They scan the Internet to identify vulnerable networks to penetrate and trigger the attack. The whole process is automated. Therefore businesses thinking they’re safe because of their industry, size or location are wrong. As long as you have systems online, you are a target.

If you’re under a RDDoS attack, think twice.

Don’t panic. Panic makes decision-making and clear-thinking difficult. Attackers usually give companies “some” time to pay the ransom. Your action in this timeframe is critical.

Seek help. In Australia, businesses victim of ransomware should contact the Australian Cyber Security Centre (ACSC) on their 24/7 Hotline on 1300 CYBER1 (1300 292 371). The ACSC will be able to help you only to a certain extent. It is also important to remember that general maintenance and optimisation of an IT infrastructure and dealing with highly sophisticated cyber attacks require very different skills - skills that your IT team may or may not have. In fact, many cybersecurity organisations have launched “rescue” services dedicated to helping businesses that are under attack in record times, and prevent any damage from RDDoS attacks.

Don’t pay the ransom. There’s no guarantee hackers won’t target you again once you have paid. If it worked once, they may actually keep threatening you. Furthermore, anything you pay is unlikely to be retrieved in the future, as malicious actors are good at covering their financial tracks.

Investigate, patch and strengthen. Don’t let it happen again and have a proactive plan in place. If attackers found a vulnerability, they’re likely to find it again. You have to understand the weaknesses attackers were able to leverage and fix them. The most common weaknesses we identified in recent times are attacks on VPN, which usage has boomed with the pandemic, or systems where two-factor authentication is not enabled. As a more long-term remediation strategy, you may want to consider network-as-a-service solutions, where your whole traffic and network are protected and processed 24/7 by a third party specialised in mitigating these large threats and optimising networks.

Ransomware and RDDoS are on the rise and the threat will only keep increasing. A whole ecosystem is building behind them, and they are innovating constantly. Any criminal can now rent ransomware from malicious actors for their own benefits, a model called ransomware-as-a-service. It takes away the need for technical skills and having to build their own attacks. The “good” side has to respond appropriately to the speed with which hackers are innovating, and I encourage any business to seriously consider how they can increase their cybersecurity standards.

Raymond Maisano, Head of Australia & New Zealand, Cloudflare.

Copyright © BIT (Business IT). All rights reserved.
Tags:
cloudflare cybersecurity ddos enterprise guide guides hacker hacking ransomware rddos security services smb smbs vpn
By Raymond Maisano
Aug 20 2021
2:36PM
0 Comments

Related Articles

  • The hidden costs of ransomware
  • Ransomware: what SMBs needs to know
  • How Australian companies can overcome the cyberattack ‘tsunami’
  • How to manage your business through a ransomware attack
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

5 essential digital transformation ideas

5 essential digital transformation ideas

How to build a digital-ready business fit for the future

How to build a digital-ready business fit for the future

Venom BlackBook Zero 15 Phantom

Venom BlackBook Zero 15 Phantom

Technology predictions for 2022 and beyond

Technology predictions for 2022 and beyond

Poll

What would you like to see more of on BiT?
News
Reviews
Features
How To's
Lollies
Photo Galleries
Videos
Opinion
View poll archive
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.