You are on page 1of 7

Ransomware –

Defense in Layers
Organizations need backup software that not only ensures top-level backup
and recovery, but also limits the number of entry points for ransomware.

Ransomware isn’t new. It’s been around a long time, and as long With the threats and costs of ransomware is as high as they’ve
as ransomware perpetrators see the opportunity for financial ever been, the challenge for IT and backup admins is to
gain, it’s here to stay. constantly re-evaluate the defensive layers needed to lessen
the risk of ransomware.
In fact, according to a 2019 report from Forrester Research1,
the number of ransomware attacks on enterprises is up 500%
over the previous year. Furthermore, Forrester projects that
these attacks will cost businesses $11.5 billion – and that’s not Ransomware attacks on
even considering the intangible costs of losing trust from your enterprises are up 500%, and will
customers and partners.
cost businesses $11.5 billion.
Furthermore, there’s also the cost of not being able to fully
recover all the data after a ransomware attack. In fact, a 2019
Forrester survey² showed that following a ransomware attack,
only 25% of survey respondents said they were able to recover
between 75% and 100% of their data. Conversely, 39% of survey
respondents said they could only recover between 50% and
74% of their data.

1 “Forrester’s Guide to Paying Ransomware,” Forrester Research, Inc., June 5, 2019


² “Ransomware Recoverability Must Be a Critical Component of Your Business Continuity Plans,” Forrester Research, Inc., October 2019.
Amount of Data Recovered after a Ransomware Attack

Less than 25%

25% to 49%

50% to 74%

75% to 100%

0% 5% 10% 15% 20% 25% 30% 35% 40%

Source: “Ransomware Recoverability Must Be a Critical Component of Your Business Continuity Plans,” Forrester Research, Inc., October 2019.
Base: 313 IT infrastructure and operations decision makers in North America, EMEA and APAC. Percentages may not total 100 because of rounding.

A 2019 Forrester survey showed that only 25% of survey respondents said they were
Just three pieces of able to recover between 75% and 100% of their data following a ransomware attack.

ransomware caused
upwards of $1 billion RANSOMWARE USES VARYING This, of course, came with no guarantee
METHODS TO GAIN ACCESS that the data will be de-crypted even if
worth of damages in companies paid the ransom.
There are various methods ransomware
more than 65 countries. uses to gain access. Some could be NotPetya
classified as “spray attacks,” which cast Unlike WannaCry, NotPetya differed in
a wide net to reach as many victims as that it was not about collecting ransom,
possible. More recently, others have but rather, it was about wreaking havoc
become very targeted towards particular and causing destruction. Spreading fast
types of businesses. Let’s explore a few was its game. Again, this ransomware
of the more well-known examples. required someone to get the tools into
WannaCry an organization before it become
effective. It used a modified version of
It’s famous, well known and sprang into Eternal Blue and a leaked Eternal
life by knocking out many organizations Romance SMB exploit.
around the globe. WannaCry exploited
a known vulnerability ― Eternal Blue ― BadRabbit
and used this vulnerability to attack
According to WIRED magazine, BadRabbit
un-patched and older systems to gain
spread via “drive-by attacks” on legit-
a foothold in the IT environment.
imate websites. End users would visit
This attack was introduced via a spray a legitimate website, while the threat
method: Mass email with attachments or actor would drop malware disguised as
links to websites, document links to file- an Adobe Flash installer. This malware
share sites, etc. Most instances came as would immediately begin locking the
the result of an end user downloading infected hardware. Ransom notes would
a document or payload that was then follow, typically asking for around $280
executed on the end user’s hardware. in Bitcoin.

Then the ransomware would encrypt data Just these three pieces of ransomware
and hackers would then request payment alone caused upwards of US$1 billion
via cryptocurrency to decrypt the data. worth of damages in more than
65 countries!

2
THE NEXT PHASE attack also has the added twist of being
updated by human interaction, just to
Ransomware is changing into a new
keep changing things and retain an entry
phase, with a more considered and
point into the organization under attack.
targeted approach. Some tool sets are
now being looked upon as Ransomware-
as-a-Service, or RaaS. These openings A LAYERED DEFENSE
and compromised credentials are being To minimize the threat of ransomware,
sold to criminals who only want to make organizations must establish a layered
money via ransom. defense. While the list presented here is
not exhaustive, and offers no guarantees
Even the financial models are changing. against ransomware attacks, it should
The days of hackers asking for $300 start you on the path to considering what
worth of Bitcoin to decrypt data are gone. to cover, or perhaps even offer a confir-
Nowadays, ransom demands commonly mation of things already in place.
range anywhere between $1M-$10M.
In addition, perpetrators are using new End-user training
tactics to collect ransom, like threatening
It’s imperative to educate and train
to publish the organization’s data openly
your userbase and let them know the
if it doesn’t pay the ransom.
risks. Educate them on the ways that
This often presents itself as a data ransomware enters an organization (i.e.
breach, opening the organization to downloads, files, fake websites, file
compliance violations from legislation like sharing sites, phishing attacks to gain
GDPR, CCPA or the new Washington user details and credentials).
state HB1071 bill changing its rules on
End users should also be made aware
Personal Identifiable Information (PII)
of physical opportunities for ransomware
data and breach notification.
to enter the organization. For example,
These attacks are also changing. Human there are known cases of infected USB
keys being left in car parks, office lobbies,
activity in prolonging the attack is also
etc. and being picked up by unsuspecting A successful attack on
becoming a growing trend. Let’s look at
one possible ransomware scenario. users who plug them into a laptop. your Active Directory
EXAMPLE SCENARIO
Patching is like handing over
In this section, we’ll explore a potential
Keep your systems up to date. Don’t the keys to the castle
rely on remembering, or spreadsheets.
Group Policy Object (GPO) attack. Group
policy is Microsoft’s core infrastructure
Automate the process with a trusted to your worst enemy.
solution, like Quest KACE Unified
for managing the configuration of both
Endpoint Management solutions. Don’t
users and computers in an enterprise
leave it to chance. Patch all machines,
windows forest.
clients and servers.
According to Microsoft: “Group Policy
Not just Windows
settings are contained in a GPO. A
GPO can represent policy settings in Don’t assume that this is just a “Windows
the file system and in the Active thing.” Linux still has its threats, so keeping
Directory. GPO settings are evaluated Linux servers updated is just as important.
by clients using the hierarchical nature
of Active Directory.” Network monitoring
Make sure you monitor anything that
You probably spotted the importance looks like traffic interception. Re-routing,
of file systems and Active Directory. spoof apps and traffic re-direction are
A successful attack on your Active the starting point to gaining access to the
Directory is like handing over the keys wider organizational infrastructure with
to the castle to your worst enemy. ‘Man in the Middle’ (MITM) attacks.
These attacks are sometimes called Data protection
Group Policy Hijacking and will use known
exploits to gain control of an entire Backing up your data seems obvious,
organization. However, this type of right? Well, these are still servers, and
they’re still running an operating system,

3
and it makes them just as vulnerable. it. Selecting ‘Everyone’ as a permissions
Moreover, backup products that use option is the easy way to make something
network shares to store backup data are work, but that also creates one of the
at a higher risk, since network shares are easiest entry points for ransomware.
a target for most ransomware.
HOW QUEST CAN HELP
DATA PROTECTION
To effectively minimize the ransomware
ONLY GOES SO FAR
risk, organizations need a backup
All things considered, creating a layered solution that provides additional strength
defense is the only reasonable outcome in combatting the ransomware impact on
that must be employed. Simply relying on backup solutions. Quest NetVault Plus
a data protection solution as a prevention does exactly this.
measure is not enough.
NetVault Plus is a broad enterprise data
A layered defense is Data protection is a reactive technology. protection solution optimized for most
You react to a need that requires data to modern data center applications and
the only reasonable be recovered. Data protection is carried infrastructure, as well as cloud solutions. It
outcome. Simply relying out on a regular basis, or should be, to has a heterogenous capability, not only in
mitigate against data loss. But this is what it protects, but also how it can be
on a data protection only effective if the solution provides deployed from a server architecture point
methods to prevent loss of the backup of view. NetVault Plus also comes with an
solution as a prevention data itself. integrated software-defined storage solution
measure is not enough. that allows for deduplication, compression,
Consider the situation where a backup encryption, replication and cloud integration.
solution is using a network share. While
it has permissions and user accounts Consider how NetVault Plus stores data.
associated with that share, the network It uses an integrated storage technology
share is still available on the network. A called QoreStor. This software-defined
GPO attack that allows elevated domain secondary storage solution is purpose-built
access to servers and client machines for backup solutions. NetVault has a tight
will make it easy for a ransomware integration with QoreStor and leverages a
perpetrator to encrypt a network share protocol called Rapid Data Access (RDA).
that contains any backup data.
Unlike Server Message Block (SMB),
Data protection solutions are a safety used for Windows shares, RDA is not
net in most instances. But with the rise an open protocol. It is not accessible
in ransomware attacks, their role in an directly by an operating system and
organization has been highlighted to be has an authentication requirement
critical in terms of recovering quickly after that sits outside of the local server or
a ransomware attack. To achieve this domain-controlled constructs. When
effectively, the backup solution must be using NetVault Plus, backup data flows
able to be as resilient as possible, with- directly from source to destination, in
out compromising its usefulness. this case QoreStor. There is no need to
have traditional media servers. While
Consider for a moment what a backup this helps to reduce complexity it also
solution must achieve: It must move reduces risk by having fewer core
all your data from point A to point B components that could be attacked.
as fast as physics will allow. At least
that’s what most people will look for. NetVault Plus strengthens your ransomware
This necessitates that it has access to protection with immutable secondary
all of the organization’s important data, storage, both on-premises and in the
applications, network, production cloud. As backup data is written to QoreStor,
storage, etc. In fact, it has more access it is made immutable such that it cannot
than most corporate users, except for be overwritten, changed, or deleted
domain administrators! outside of the required retention settings.1

Yet, we still see data protection solutions NetVault Plus also protects against
that are poorly secured with default user- ransomware attacks by storing a copy of
names and passwords. Or these data all deleted backup data in the QoreStor
protection solutions use open shares that data recycle bin for the specified reten-
are just that: wide open. We’ve all done tion period.1

4
Additionally, NetVault Plus uses source-side You may have noticed so far that
deduplication to reduce the amount of data ransomware has been known to
being sent over a network, from a client predominately target Windows-based
machine to storage. This further reduces systems, partly due to popularity, but
exposure to data capture techniques. also due to the number of existing user
client/user endpoints that ransomware
On top of that, NetVault Plus employs perpetrators can take advantage of.
Secure Connect technology that wraps
the data transfer and control commands
in a TLS 2.0 secure layer. This is a great
step to restrict access of your backup
data from ransomware. Of course, NetVault NetVault Plus
Plus itself can still have access to uses source-side
the backup data, so we also need to
consider that too. deduplication to
reduce the amount of
Operational improvements using NetVault Plus.
data being sent over
Item Content Remarks a network … further
WORM NetVault writes backups as data streams to QoreStor.
NetVault Plus data This data stream cannot be modified by NetVault. reducing exposure to
on QoreStor NetVault can remove the entire data stream (backup)
from QoreStor, not parts of it.
data capture techniques.
RDA NetVault only has access to QoreStor via the RDA
protocol. This protocol has different versions. NetVault
QoreStor Access uses version 2.0, which allows writing, reading and
(protocol) replication of data only. Change is not possible. Data
written by RDA on QoreStor cannot be accessed via
CIFS/SMB, NFS or other protocols.
Username/ Access to QoreStor always takes place via a user
Password account and password combination. Passwords are
QoreStor Access
encrypted (AES) and exchanged via encryption (AES).
(authentication)
Access to QoreStor on a management level does not
allow access to data, only to configuration settings.
RDA Data stored by using the RDA protocol is accessible
only from the original (backup) server. An alternative
Data Access
backup server has no access to the data without the
correct credentials and unique identification number.
SSH It is possible to access QoreStor via SSH, however,
this does not allow access to the data, only to a menu
QoreStor Access
of configuration settings. SSH access requires a
password login.
Dedupe All data on QoreStor is stored in its own format. There
Type of storage is no readable file system with visible files representing
files or parts of files in a backup stream.
Linux QoreStor runs on Linux and can run on a minimal
installation. It supports the use of a Linux firewall adding
Used OS
the rules during installation. It also support the use
of SELINUX.
OS It is recommended that OS patching is maintained
Patching to ensure secure operation of the OS against
known vulnerabilities.
RDA RDA is a protocol created and owned by Quest.
There is no public description of this protocol available.
Protocol
RDA is only used in Quest products. Currently
NetVault, vRanger.

5
NetVault Plus minimizes that threat by CONCLUSION
installing the server and its infrastructure In the end, even the most prepared
components on Linux. While not organization can’t completely protect
completely invulnerable, installing the itself against ransomware attacks. But
server on Linux reduces the number of you can limit the risks when you have
potential threats. Because NetVault Plus a backup solution that not only allows
is a completely heterogeneous solution, you to restore all your data quickly and
with core components running on Linux, fully, but also:
NetVault Plus continues to protect
Windows, Unix, Linux, application data • Mitigates the risks of ransomware
and virtualization platforms in the impacting your business
same way.
• Reduces the number of core
Another consideration is how access components that can be attacked
is granted. NetVault Plus has two main • Limits exposure to data capture techniques
methods for granting access: Integration
with a directory service or its own role- • Restricts your backup data
based access mechanism. Given the from ransomware
potential issues we’ve already discussed
For more information about NetVault Plus,
about GPO attacks, we must consider
visit: https://www.quest.com/products/
that this level of compromise could allow
netvault/netvaultplus.aspx
access to the backup application
where systemic data deletion could 1 See the QoreStor Interoperability Guide
be achieved. for supported backup solutions.
But NetVault Plus has the ability to
provide robust role-based access with-
out the need to integrate with a service
such as Active Directory. While this might
be less convenient for user and group
control, it does offer another degree of
separation from the production envi-
ronment and potential access by an
undesired third party.

6
ABOUT QUEST
Quest provides software solutions for the rapidly-changing world of enterprise IT. We help simplify the challenges caused by data
explosion, cloud expansion, hybrid datacenters, security threats and regulatory requirements. We’re a global provider to 130,000
companies across 100 countries, including 95% of the Fortune 500 and 90% of the Global 1000. Since 1987, we’ve built a portfolio of
solutions which now includes database management, data protection, identity and access management, Microsoft platform manage-
ment and unified endpoint management. With Quest, organizations spend less time on IT administration and more time on business
innovation. For more information, visit www.quest.com.

© 2020 Quest Software Inc. ALL RIGHTS RESERVED.

This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a soft-
ware license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable
agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, includ-
ing photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Quest
Software Inc.

The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel
or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software prod-
ucts. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT,
QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY
RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR
A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDI-
RECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR
LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE
THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software
makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves
the right to make changes to specifications and product descriptions at any time without notice. Quest Software does not make any
commitment to update the information contained in this document.

Patents

Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current
information about applicable patents for this product, please visit our website at www.quest.com/legal

Trademarks

Quest and the Quest logo are trademarks and registered trademarks of Quest Software Inc. For a complete list of Quest marks, visit
www.quest.com/legal/trademark-information.aspx. All other trademarks are property of their respective owners.

If you have any questions regarding your potential use of this material, contact:

Quest Software Inc.


Attn: LEGAL Dept
4 Polaris Way
Aliso Viejo, CA 92656

Refer to our website (www.quest.com) for regional and international office information.

WhitePaper-ReducingRiskRansomwareAttack-US-LP-68964

You might also like