Security-first approach to defend against ransomware attacks

Defend Against Ransomware Attacks: A Security-First Approach

By Raj Dutt • March 11, 2020

To combat the evolving cyber threat landscape, enterprises globally are increasing their data security investments. The global spend on cybersecurity skyrocketed from $3.5 billion in 2004 to $124 billion in 2019. This 35x jump is expected to exceed $1 trillion by 2021.

Despite significant investments in data security, organizations of all sizes (large multinationals to state and city governments) are experiencing a rapid increase in frequency and intensity of ransomware attacks. The impact of these attacks can be crippling and mostly can be attributed to a combination of unresolved software vulnerabilities and internal human actions/errors, along with sophisticated tactics that incorporate numerous techniques to go undetected for some time to spread throughout an environment before manifesting.

In 2019, cyber breaches cost the global economy $2.1 trillion, and $11.5 billion of that was from ransomware attacks. Law enforcement agencies, including Europol pointed out that ransomware remains the top threat worldwide. Yet as reported by Forrester Research, only 21 percent of surveyed organizations confirmed they have contingency plans to recover from ransomware attacks, and only 11 percent of survey respondents said that they were confident to recover their data within three days of an attack.

So Why Are Organizations Unable to Defend Against Ransomware?

To ensure a payout, cyber criminals are not just attacking the production environment but increasingly targeting backup data and infrastructure—effectively hobbling the “insurance policy” organizations depend upon when disaster strikes. The attackers are often exploiting weaknesses associated with legacy backup solutions architectured before the advent of the ransomware industry. Before encrypting the production environment, sophisticated malware are known to destroy shadow copies and restore-point data. These malware make legacy backup infrastructure easy prey rather than a defense against ransomware attacks. 

Continued employee cybersecurity education and investment in security tools is important. Organizations also need to deploy a modern, robust backup solution that helps defend backup data against ransomware attacks. 

Cohesity’s comprehensive anti-ransomware solution goes beyond detection. Following a typical attack lifecycle, Cohesity offers an end-to-end solution (Figure 1) that helps enterprises:

  • Reduce their attack surface
  • Leverage backup data to assess their overall security posture
  • Defend backup data with unique architecture and easy policy-based data management
  • Detect anomalies that signal potential attacks with machine learning and most importantly, 
  • Rapidly respond to a ransomware attack with recovery at scale

Let’s double-click on Cohesity Anti-Ransomware Solution.Integrated Cybersecurity Diagram

Figure  1: Cohesity Anti-Ransomware Solution

Reduce Attack Surface

Cohesity customers reduce their data footprint by consolidating various backup components, disaster recovery, file services, object storage, dev/test and analytics on one web-scale platform. Customers further reduce their data footprint and attack surface with Cohesity’s global variable-length dedupe across data sources and compression.

Assess Security Posture

Unlike legacy backup vendors (the red and the blue guys), that are just expensive insurance policy, Cohesity enables enterprises to make their backup data productive. Cohesity CyberScan, powered by Tenable.io takes advantage of Cohesity’s unique architecture to scan backup copies (instead of the live production environment) to discover any cyber exposures and software vulnerabilities across an organization’s production IT environment. The application gives a global view of all vulnerabilities through an easy-to-read security dashboard (Image 2) along with actionable recommendations on how to address exposures before hackers exploit them. 

Ransomware Security Dashboard

Figure 2: Helios Security Dashboard

Prevent Backup from Becoming a Ransomware Target

A modern backup solution with multi-layered defence approach is needed to defend against sophisticated ransomware attacks, which include:

  •  Immutable File System: At its core, Cohesity’s immutable file system, SpanFS, keeps the backup jobs in time-base immutable snapshots. The original backup job is kept in an immutable state and is never made accessible, which prevents it from being mounted by an external system. The only way to mount the backup in read-write mode is to clone that original backup, which is done automatically by the system. Although ransomware may be able to delete files in the mounted (read-write) backup, it cannot affect the immutable snapshot. 
  • DataLock: DataLock is a WORM for backup snapshots that offers another layer of protection against ransomware attack. Available since Cohesity Pegasus 6.1, this capability enables security officers to create and apply a “DataLock” policy to selected jobs and achieve a higher order of immutability for protected data—something that security officers and admins cannot modify/delete. This feature integrates with RBAC, eliminating the need for third-party tools.
  • Multi-Factor Authentication: As much as we want passwords to offer guaranteed protection, passwords get compromised all the time. Cohesity offers multi-factor authentication, which is the best way to mitigate against phishing schemes and other password hacks.  
  • Policy-Based Air Gap: Nothing is 100 percent certain, other than taxes and death.  eplicating your mission-critical data to another Cohesity immutable cluster/site adds another layer of protection against ransomware attacks. Unlike legacy solutions/approaches, where an air-gapped solution could be compromised because of replication of encrypted/ransomware affected data to the system in air-gap, replicating data to another Cohesity cluster/site does not affect the air-gapped copy because of the immutable file system on that site as well.

Machine Learning-Based Ransomware Detection and Actionable Recommendation

In a perfect world, we shouldn’t have to worry about ransomware attacks, but unfortunately, that’s not our world today. In a situation where your primary environment, users, and application infrastructure is compromised, Cohesity Helios can help you out of that jam. With its latest anomaly detection, Helios, our SaaS-based, machine-drive solution, will provide eyes and visibility when you’re not able to. With SmartAssist, Helios will alert not just the IT admin but also Cohesity’s support team when the primary files data-change rate is out of the norm. Anomalies will be detected based on matching any larger data changes against the normal patterns, including:

  • Daily change rate on logical data
  • Daily change rate on stored data (post-dedupe)
  • Pattern based on historical data ingest
  • Entropy (randomness of data)

Besides monitoring the backup data change rate to detect a potential ransomware attack, Cohesity’s machine learning algorithms also helps locate a clean copy of the data that can be used for recovery.

Rapid Response

The most important requirement after a ransomware attack is having the ability to quickly recover compromised data. Unlike any solution available in the industry today, Cohesity offers the ability to locate and delete infected files across your global data footprint, including in the public cloud. Your apps and data are instantly brought back using Cohesity’s instant mass restore by offering:

  • Unlimited Scalability: A web-scale platform that allows IT admins to grow their Cohesity cluster from three to unlimited nodes with the ability to store unlimited snaps and clones without any performance impact.
  • Global Actionable Search: Unlike legacy solutions that rely on third-party search products, Cohesity’s unique, Google-like global search capability that allows you to quickly locate data and infected files and take appropriate corrective actions. This includes finding a malicious file across all workloads and taking necessary action to contain it.
  • Instant Mass Restore: When ransomware strikes, you are not dealing with one, two, or a few VMs/files, but rather a disaster recovery scenario in which the IT admin needs to recover hundreds of VMs. Unlike other backup solutions, traditional or modern alike, it can take days, if not weeks to recover. With Cohesity’s instant mass restore, IT admins can recover hundreds of VMs instantly, at scale, to any point in time. Here are additional details: 
      • Cohesity’s patented B+ tree metadata structure keeps any recovery no more than two hops away.

Snaptree for Ransomware Diagram

      • All snapshots on Cohesity are kept fully hydrated (i.e. in the same format as in the original VM environment), so the system doesn’t have to spend time and resources stitching backups.
      • Because SpanFS is a distributed file system that mounts the data using NFS/SMB protocols, data is instantly available while the recovery is happening in the background.

Ransomware is so common it has practically become a household name. Yet ransomware remains a daunting threat to enterprises in need of a modern solution that offers more than the ability to simply detect a threat. Below are a few helpful links to learn how Cohesity offers a comprehensive solution against ransomware attacks. 

Anti-ransomware explainer video

Cohesity Anti-ransomware solution

Gartner report

Forrester report