Knowing and minimizing your web attack surface is critical to reduce the risk of ransomware attacks. This article runs through the main ransomware types and presents best practices for closing off attack avenues to malicious actors.
Key takeaways
Ransomware is a type of malware in which an attacker gains access to a computer system, encrypts data, and demands a ransom payment to restore the victim’s access to their data. It’s an increasingly popular attack method: According to the latest IBM Cost of a Data Breach Report, ransomware made up 11% of all breaches in 2022, compared to less than 8% in 2021. It’s also hugely effective, as today’s organizations are exposing too much of their data to the outside world. Because data is the crucial bargaining chip, some attackers are now skipping the encryption step and simply threatening to leak sensitive information.
Let’s look at some general strategies to protect against ransomware and improve overall cybersecurity by reducing the attack surface that’s exposed on the web.
There are several types of ransomware, each with varying levels of risk. Four common examples are described below.
A ransomware attack can have serious operational consequences. When employees can’t access computers or networks, productivity grinds to a halt. In the case of organizations such as hospitals, human lives and well-being could be at stake. (A Ponemon Institute survey found that more than 60% of hospitals hit with ransomware attacks are forced to delay necessary medical procedures and tests.)
Ransomware also comes with a financial cost. IBM concluded that the average cost of detecting and mitigating a ransomware attack exceeds $4.5 million. The cost climbs above $5.1 million for organizations that don’t pay the ransom.
There’s also the reputational risk to consider. As a customer, would you want to do business with an organization that was hit with a ransomware attack? Would you trust them with your personal or financial information? Probably not.
One of the biggest reasons that today’s organizations are so susceptible to ransomware is the size of their web attack surface. The National Institute of Standards and Technology defines an attack surface as “the set of points on the boundary of a system (…) where an attacker can try to enter, cause an effect on, or extract data from that system.”
When it comes to ransomware, there are typically three attack surfaces:
For a typical organization, the web attack surface only grows over time. Every time a new employee is granted access to a web application, a new device is used to log in to the app, a new plug-in or service is connected to the app, or a new sensor starts sharing data with the app, the attack surface grows.
Sometimes, IT and security teams can reduce the web attack surface by limiting which applications are used by which users. For example, most organizations have clear policies and procedures for determining access and privileges for new hires, or for approving the use of new web applications or cloud-based services company-wide.
In other cases, though, the attack surface grows without anyone knowing. An executive might use a personal phone or tablet to access corporate systems. A development team might move a production application to a different cloud service provider. A sales manager might install a plug-in for a customer relationship management app without getting IT approval first.
When this happens, the risk of a ransomware attack increases for two reasons. One is volume, as there are now more network endpoints to manage. The other is visibility, as these endpoints are furthest from the eyes and ears of the IT department. They’re unlikely to be behind the corporate firewall or protected by commonly used security tools such as antivirus software. On top of that, if one of these “invisible” endpoints is targeted in an attack, it could be weeks or even months before IT and security staff detect it – which will drive up mitigation costs.
One of the best ways to protect against ransomware is to shrink the web attack surface. This involves taking steps such as minimizing the number of exposed endpoints, securing network gateways, ensuring systems as well as access policies are up to date, and helping employees know what to look for. What’s more, the actions described below have the additional benefit of protecting against other types of cyberattacks as well, including those caused by human error, attacks on business partners, or IT failures.
Here are eight ransomware prevention best practices to consider for your organization.
These steps are critical to prevent ransomware and improve an organization’s security posture – but they do not cover web application security. Considering the scale of modern web environments, the challenge of also securing all their websites and applications can be overwhelming to organizations that don’t know where to start.
Dynamic application security testing (DAST) is specifically designed to automatically locate, identify, and help remediate vulnerabilities in the websites and applications that make up a large part of your external attack surface. It enables organizations to close entry points that are unnecessary or otherwise vulnerable, shrinking their overall attack surface – and reducing the risk of a crippling ransomware attack.