Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

How to defend against human operated ransomware

By Raj Bhowmick
hackers

Designed by Freepik

March 12, 2021

According to Cybersecurity Ventures, the costs of global ransomware campaigns are expected to increase from $11.5 Billion in 2019 to $20 Billion in 2021. The same report states companies fell victim to ransomware attacks every 14 seconds in 2019 and predicts it will reach every 11 seconds in 2021.

Ransomware can be delivered via several mechanisms, the most popular of which is often phishing.  However, a new category called “Human-Operated“ Ransomware is now being used to execute multi-level attacks against company networks. Here’s how it works:

  1. Attackers gain initial access to a company's network via a remote desktop protocol (RDP) or phishing attack, and distribute malware like Dridex and Trickbot
  2. They steal user credentials with tools such as Mimikatz and Lazagne 
  3. Next they use PowerShell Empire and Cobalt Strike to perform reconnaissance and move laterally across the environment
  4. Finally they use privilege escalation via Domain Administrator access to install ransomware software

Microsoft has observed that some attackers persist in a victim’s environment for months while performing reconnaissance to find crown jewel targets, before dropping ransomware. They often use the victim’s infrastructure for bitcoin mining, running SPAM campaigns, and other criminal for profit activities. Adversaries also persist their access so that even after the ransom is paid, they can return for repeat attacks.

Clearly, since ransomware attacks have increased  40% year over year, traditional protection approaches are not working. This is primarily because they focus on the infrastructure layer of IT environments and miss a host of application vulnerabilities. A new approach to enterprise security is gaining popularity, which aims to provide visibility into applications — including their behavior and dependencies — not just network activity.  

By monitoring the run-time execution of applications based on processes, identities, and network connections, organizations can establish a baseline for expected behaviors and detect anomalies indicative of ransomware, or other attacks. This baseline and ongoing visibility enables organizations to identify where application risks reside, including:

  • Exposed internet-facing services such as RDP
  • Execution of services like RDP and  SSH and where they can be used for lateral movement
  • Out-of-support operating systems, application runtimes like JVMs, and their relationships to sensitive applications that can be exploited by attackers to escalate privileges and move laterally
  • Privileged credentials that can be used for lateral movement as well as activation of ransomware

This combination of the application inventory and risk posture visibility can help organizations address risks via fixes, policies and controls.  While fixes can address some risks, policies and controls are needed to ensure business critical applications are protected. These can be implemented in a variety of ways to remediate risks and vulnerabilities that attackers can exploit, such as:

  • Implementing CIS Security and NIST guidelines to automate and enforce industry-standard best practices for server hardening
  • Using machine learning to automate acceptable use policy generation for allow listing, identity, and network activities in application environments
  • Enforcing microsegmentation policies from the endpoint, preventing lateral movement
  • Performing system integrity monitoring of processes and files to identify unauthorized changes, process injection, and process-hollowing.
  • Implementing behavioral analysis and anomaly detection capabilities for process execution, service account usage and network connections to detect anomalous activity that may be malicious in nature 

In addition, organizations require alerting capabilities to be notified of anomalous events and initiate automated responses such as blocking connections, killing processes, and terminating sessions. Forensics down to process execution trees should accompany alerting to provide indicator of compromise data to help incident response teams reduce identification and containment times.

Unlike traditional malware threats, ransomware attacks can now involve a sophisticated, multi-stage campaign that can last weeks, if not months after attackers gain an initial foothold in the environment. By supplementing infrastructure security monitoring and controls with application-centric security capabilities, organizations can detect ransomware activity early in the kill chain to block and prevent an enterprise scale compromise.

KEYWORDS: cyber security information security ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Raj Bhowmick is Director of Solutions Engineering at TrueFort, where he helps large enterprises protect their application ecosystems from advanced cyber attacks and insider threats. Raj has a decade of experience in cybersecurity, web application security and fraud prevention. He holds a B.S. in Computer Science from Rutgers University and an M.S. in Cybersecurity from Johns Hopkins University.   

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • video conference

    How to Defend Against Digital Surveillance when Teleworking

    See More
  • wire fraud cyber security

    How to defend against real estate wire fraud

    See More
  • data-protection-freepik1170x658v504.jpg

    How a more unified approach to data protection will help in the fight against ransomware

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing