Ransomware is a malware, or Trojan attack. Once a computer is infected, the ransomware encrypts, or locks, important data; some threaten to delete files. The only way to unlock it is paying a fee, or ransom to the developers of the Trojan software. Ransomware attacks use a file disguised as a legitimate document. The Trojan activates when a user opens an infected file, such as an invoice or word document. The email looks real and tricks the user into opening the document, infecting the system.
Common ransomware includes Cryptolocker, Criptowall, Locky, Zepto and WannaCry.
AV Defender is effective against any crypto-strain if the Active Virus Control (AVC) is enabled in the Behavioral Analysis module of the AV Defender profile(s) applied to the device(s). Ransomware has many variants that are released constantly. Ransomware is deployed once a ZBOT is received by email, and fresh copies of the virus are downloaded in real time from the internet. These files are updated continually to prevent detection by the Antivirus software. While BitDefender does work continually to stay on top of every variant of these infections and while AVC and IDS both help considerably to keep a device from becoming infected, it's important to recognize that no AV software is 100%, completely foolproof.
How to protect against Ransomware
Protecting yourself and customers from a ransomware infection requires education and a good defense. Ensure your customers know the basics of preventing malware to propagate:
- Ensure users understand the issues involved with opening files that may seem suspicious such as an invoice or document that is not expected.
- Do not open email or files from unknown senders or click links in email.
- Ensure the Macros feature in Microsoft Office is turned off.
- Be aware of new threats or what is trending in the "wild" that could be harmful and alert customers immediately
AV Defender/Security Manager
Always have the latest AV Defender software installed so you can ensure to have the most recent virus signatures. In your Security Manager | AV Defender profiles, ensure the Detection Level of the AVC component is set to at least Normal. A setting of Aggressive will help on a more combative scale, however this can also flag and cleanse legitimate applications, resulting in a higher false-positive rate.
- Click Configuration > Security Manager > Profiles.
- Click the Default Profile - Laptops/Workstations Normal Protection profile.
- For the Behavioral Analysis module, click View Settings.
- In the Active Virus Control area, set the Detection Level.
- Click Save.
- For more information on Security Manager | AV Defender profiles, see Security Manager Profiles.
- For recommendations on adding another level of security to your environment, see the BitDefender document, How to protect from ransomware.
Ensure devices have the most recent software updates using Patch Manager. Software companies do what they can to minimize issues connected with threats and attacks. Patch Manager provides the capability to effectively manage the downloading and installation of Microsoft and third party software patches across your customers' networks.
- For more information, see What is Patch Management.
Backup Manager/SolarWinds Backup
Ensure important information is regularly backed up to another location, preferably a secure, off-site location. Should an infection occur, with data stored elsewhere, your customers are not prevented from continuing their business due to a locked computer. Information is still readily accessible. SolarWinds N-central backup solutions Backup Manager or SolarWinds Backup ensures key data is still retrievable.
- For more information on Backup Manager see What is Arcserve Backup.
- For more information on SolarWinds Backup, see What is SolarWinds Backup.
BitDefender also offers these recommendations to add another level of security to your environment from CryptoWall.
BitDefender has some recommendations and best practices on how we can help to prevent these kinds of attacks and educate our clients in identifying social engineering attempts and spear-phishing emails.