Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityLogical SecuritySecurity & Business Resilience

How security teams should respond to sophisticated ransomware attacks

By Carlos Arnal Cardenal
laptop-with-padlock.jpg

Image via Unsplash

May 31, 2023

Security leaders hear about it in the news and it never seems to let up: the latest ransomware attack strikes another organization and new victims, targeting everything from critical infrastructure across the globe to court systems, universities, hospitals and more.

Unfortunately, these attacks continue to rise; ransomware instances approached record highs in the first and third quarters of 2022 and don’t appear to be slowing down in 2023. As a constantly evolving form of malware, ransomware attacks only grow in sophistication and find new ways to steal business-critical data.

So, what can organizations do? Below, are the typical stages of a ransomware attack, touch on how ransomware is evolving, and explore tips on how security teams can combat these growing, changing threats.

Lifecycle of a ransomware attack

Today’s cyberattacks use advanced tactics to bypass traditional malware detection measures and hide in the everyday nature and complexity of their target's environment. They move through the network seeking to steal data, install ransomware, encrypt data, and wreak havoc.

There are four general stages to the lifecycle of a ransomware attack. They entail:

  • Initial access: Cybercriminals look to gain a foothold in an organization’s network, often via password theft, exploiting software vulnerabilities, phishing or brute force. Attackers will then try to discover critical identities and obtain login credentials. 
  • Consolidation and preparation: Once they gain network access, threat actors rely on a variety of methods to execute an attack. They will either enter with malware containing a package of tools needed for the attack. Or, after the intrusion, they will download the tools they need by establishing communication with a command-and-control server to move forward with the next steps in the attack. 

The attacker’s “toolbox” includes:

  1. Reconnaissance tools that enable the attacker to understand where they are in a network and what accounts to target.
  2. Credential dumping tools can compromise the login credentials of privileged accounts, which the attacker can use to move laterally within a network.
  3. Built-in programs such as PowerShell, Windows Management Instrumentation (WMI) and PsExec. In some attack instances, commands from WMI and PsExec were used to delete local backup copies and PowerShell was used to create malicious backdoors. 
  • A Lateral movement and privilege escalation: A threat actor will escalate an attack by leveraging their access to traverse the infrastructure, moving laterally to find vulnerable privileged accounts. Attackers will typically carve a path to the most critical data by breaking through security layers and gathering additional privileges. A common technique in ransomware attacks is exploiting administrator accounts, as organizations tend to have one common password for all local admin accounts. In gaining admin privileges, attackers can tamper with security configurations to disable security controls, avoid detection and download and install a payload to the victim’s endpoint. Access to domain controllers also enables attackers to release malware to all network systems in one shot. 
  • Impact on target: In the final stage, ransomware has been downloaded and installed on the victim’s system. Once the attacker has disabled the system’s critical protection, they will seek to exfiltrate sensitive information on the endpoint, destroy the organization’s backups and finally encrypt systems and data. Ransom notes or lock screens direct the victim to the hacker’s demand for payment (usually via cryptocurrency) and other details to ensure the victim complies with their demands. 

No longer an individual culprit

Often, a ransomware event is an orchestrated attack executed not by a single individual, team, or even organization, but by a network of cybercriminals and groups. Like other cyberattacks, ransomware has been able to grow and scale because a malicious actor no longer needs to be an expert at every phase of the attack. Bad actors who specialize in one area — such as email phishing, creating a ransomware payload, or running a botnet — can work with other individuals who specialize in other methodologies, allowing less sophisticated threat actors to outsource to other groups. The person delivering ransomware may not be the same individual who broke into a machine or network.

For instance, maybe the initial breach is managed by someone who specializes in hacking an organization’s network or systems. After they gain access, that individual can hand off to someone else who specializes in setting up a remote trojan or malware stager. They can add the accessed network to a botnet of infected machines, giving control to the attacker. Then a ransomware actor can obtain access and deliver the ransomware payload through the botnet to target machines. Such a coordinated attack requires an equally coordinated defense.

How to defend against today’s ransomware 

The best defense against ransomware attacks is to prevent them before they can occur. Here are 10 steps an organization can take to combat and mitigate ransomware threats.

  1. Perform frequent backups of critical data, system images and configuration regularly. Test backups and maintain them offsite and offline where attackers can't find them.
  1. Implement MFA. Multi-factor authentication remains the single best security practice an organization can adopt. Set and enforce strong passwords that are managed through a password manager. 
  1. Limit access to resources over internal networks and enforce time-based access for privileged accounts. Restrict permissions, remove local admin rights from end users and block application installation by standard users. 
  1. Keep security solutions updated. UTMs with sandboxing can detect and sequester malicious files entering the network. 
  1. Patch everything early and often. Patching will keep all operating systems and software current. Ransomware attacks like WannaCry and NotPetya exploited unpatched vulnerabilities to spread around the globe. 
  1. Implement anti-phishing protection with different security layers at the endpoint and perimeter. 
  1. Lock down accessible services at the firewall. If it isn’t needed, turn off remote desk protocol (RDP), and use rate limiting, two-factor authentication, a virtual private network (VPN) or other remote-access tools. 
  1. Ensure anti-tamper protection is activated. Ryuk and other ransomware strains attempt to disable endpoint protection; make sure this security layer is enabled. 
  1. Monitor and respond to alerts. Consider implementing advanced endpoint security solutions such as an endpoint detection and response (EDR) tool that includes a zero-trust protection model approach with multiple layers of defense. 
  1. Raise awareness among users about the risks of phishing and educate them about the dangers of social engineering as part of the organization’s best cybersecurity practices. 

Finally, obtaining cyber insurance can play a significant role in network protection. Cyber-insurance coverage can help defray the costs related to downtime following a ransomware attack and bringing in an incident response firm to investigate the attack. Cyber-insurance providers often impose strict requirements in order to obtain coverage, however. The silver lining is that working to meet these requirements forces companies to tighten their security structures, resulting in stronger overall security programs.

While ransomware attacks continue to grow more sophisticated, the defenses used against them do as well. A comprehensive security program combined with user awareness of best practices is key to keeping the bad guys out and critical data safe. Know the threats you face and stay vigilant to do your part in keeping your environment secure.

KEYWORDS: cyberattack data breach data breaches infastructure multi-factor authentication passwords phishing attack ransomware vulnerability

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Carlos Arnal Cardenal is the Product Marketing Manager at WatchGuard Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Looking for Clues

    Suite success: Three steps executive teams should take to prevent and survive a data breach

    See More
  • Cyber Liability Insurance: Moving from Insurance to Assurance; cyber security news

    How to protect businesses against the threat of ransomware attacks and the role of cyber insurance

    See More
  • SEC0219-pen-Feat-slide1_900px

    11 Types of Spoofing Attacks Every Security Professional Should Know About

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!