September

NIST PR.IP-9

“Securing Your Extended Ecosystem”

Ransomware

Ransomware isn't just about lost files; it’s about business survival. A single weak 'key' can stop a multi-billion dollar operation and cause global headlines.

Cautionary tale: The SolarWinds Supply Chain Trojan

In May 2021, a single leaked password for a dormant VPN account allowed hackers to enter the Colonial Pipeline network. They deployed ransomware, forcing a total shutdown of the fuel supply for the US East Coast and triggering a national state of emergency.

The Lesson: One weak password without Multi-Factor Authentication (MFA) can have real-world physical consequences. It can stop the flow of gas, water, and electricity.

Understanding the Ransomware Chain

Ransomware is a multi-stage process, and you can stop it at several points.

  • The Entry: Usually via a phishing link, a weak password, or an unpatched software vulnerability.

  • Lateral Movement: Once inside, hackers look for your backups and sensitive data to steal them before they encrypt your files.

  • The Squeeze: Hackers demand payment twice—once to give your files back, and once to promise they won’t leak your data online.

Spotting the Signs

  • Computer Sluggishness: Sudden, extreme slow-downs can be a sign of files being encrypted in the background.

  • Ghost Logins: Alerts that your account logged in from a strange location or at an odd hour.

  • Missing Files: Files or folders appearing with strange new extensions (e.g., .locked or .crypted).

September Security Checklist

  • Back Up Daily: Ensure your work is saved to SharePoint/Google Drive. Local “Desktop” files are the first to be lost in an attack

  • Check Your MFA: Ensure MFA is active on every single work and personal account you own.

  • See Something, Say Something: If your computer shows a ransom note, unplug the network cable immediately and call the emergency IT line.

Symbol Security

Ready to Implement This Month's Security Focus?

Deploy automated security awareness training with Symbol Security. Schedule simulations, track progress, and measure improvement across your organization.