#StopRansomware: RansomHub Ransomware

#StopRansomware: RansomHub Ransomware

August 29, 2024 at 01:53PM

Summary:
The FBI, CISA, MS-ISAC, and HHS have released a joint Cybersecurity Advisory to disseminate information about RansomHub ransomware, including its tactics, techniques, and procedures. The advisory includes details on the ransomware’s impact, mitigation recommendations for network defenders, technical details, and further resources to protect against ransomware threats.

Based on the meeting notes provided:

The joint Cybersecurity Advisory aims to publish advisories for network defenders detailing various ransomware variants and their threat actors, and to provide information on tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. The latest advisory focuses on RansomHub ransomware, providing details on how it operates, including data exfiltration methods, encryption tactics, leveraged tools, indicators of compromise, and impact as per the MITRE ATT&CK Matrix for Enterprise framework, version 15.

The authoring organizations recommend implementing several mitigations to reduce the likelihood and impact of ransomware incidents, including maintaining and retaining multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location, up-to-date operating systems and software patching, and real-time detection for antivirus software on all hosts. Furthermore, it is recommended to create and enforce strong password policies, employ phishing-resistant multifactor authentication, and segment networks to prevent the spread of ransomware. Additionally, software manufacturers are urged to embed security into product architecture throughout the entire software development lifecycle and mandate multifactor authentication for privileged users.

In case of a compromise, organizations are encouraged to take specific incident response steps, such as quarantining or taking potentially affected hosts offline, re-imaging compromised hosts, and reporting the compromise to relevant authorities. Organizations are advised to validate their security controls against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework by testing their existing security technologies against the described techniques to optimize their security programs.

The advisory also highlights that organizations have no obligation to respond or provide information to the FBI, but provides guidance on what information the FBI is interested in if the organization decides to provide information.

Finally, the authors recommend against paying a ransom, as payment does not guarantee that victim files will be recovered.

For further details, it is encouraged to review the detailed report available in PDF format and to ensure the organization’s cybersecurity policies and practices are aligned with the recommended mitigations and best practices provided in the meeting notes.

Full Article