What is Ransomware?

Understanding ransomware attacks

Ransomware is a type of malware that prevents victims from accessing their data or systems — typically by encrypting files or locking devices — and demands payment in exchange for restoring access. To be successful, the ransomware malware needs to gain access to a target system, encrypt the files there, and demand a ransom from the company, often delivered through a ransom note displayed on screen.  Attackers typically demand payment in bitcoin or another cryptocurrency and claim they will provide a private key to decrypt the files. However, paying the ransom does not guarantee that the victims of ransomware attacks will receive the key or that encrypted data will be restored.

Once simply a nuisance strain of malware used by cybercriminals to restrict access to files and data through encryption, ransomware has morphed into an attack method of epic proportions. While the threat of permanent data loss alone is jarring, cybercriminals and nation-state hackers have become sophisticated enough to use ransomware to penetrate and cripple large enterprises, federal governments, global infrastructure and healthcare organizations. As a result, ransomware incidents are now routinely investigated by law enforcement agencies, including the FBI, due to their scale and impact.

What is the impact of ransomware?

In 2020, the Snake ransomware attack brought Honda’s global operations to a standstill. That same week, Snake, a form of file-encrypting malware, also hit South American energy-distribution company Enel Argentina. In 2019, cybercriminals encrypted files that froze the computer networks of Pemex, Mexico’s state-owned gas and oil conglomerate, demanding $5 million to restore service. And in 2017, the WannaCry ransomware cryptoworm infected more than 200,000 computers across roughly 150 countries by exploiting a vulnerability in Microsoft Windows.

Today, through a mix of outdated technology, “good enough” defense strategies focused solely on perimeters and endpoints, lack of training (and poor security etiquette), and no known “silver bullet” solution, organizations of all sizes are at risk. Especially as cybercriminals are making it their business to encrypt as many computer systems on the corporate network as possible in order to extort a ransom ranging from thousands to millions of dollars. Ransomware has become one of the most damaging forms of malware and cybercrime, costing organizations billions of dollars annually through operational disruption, recovery costs, and lost data.

How does ransomware spread?

A popular method to introduce ransomware to a new environment is through the use of phishing emails. A malicious email or email attachment may contain a link to a website that hosts a malware download or an attachment with a built-in downloader. In some cases, users are tricked by a deceptive pop-up prompting them to click or install malicious software. If a user opens a malicious attachment, enables macros, or clicks a malicious link in a phishing email, the ransomware payload may be downloaded and executed on their system.

Once an endpoint or victim’s computer is infected, the cyberattack will attempt to spread to as many machines as possible throughout the network by executing unauthorized lateral movement to maximize the blast radius (encrypting as many disks as possible).

Another popular ransomware infection vector takes advantage of Remote Desktop Protocols (RDP). With RDP, a hacker who has gained access to login credentials can use them to authenticate and remotely access endpoints within an enterprise network. With this access, bad actors can directly download and execute the malware on machines under their control and attempt to move laterally through the environment, capturing and encrypting data on additional assets.

A defining aspect of ransomware attacks is the use of encryption or system lockout to extort payment from victims in exchange for restoring access to their data. By encrypting highly valuable data, the cybercriminals or ransomware attacker can demand a ransom in exchange for the decryptor or decryption keys to release the files back to the company. However, ransomware hackers don’t always release the encrypted files back to the organization, even if they pay the ransom.

Read more in our blog post How Does Ransomware Actually Spread?

Why do legacy firewalls fail when attempting protection against ransomware?

Legacy firewalls control communications between VLANs and zones. Traditional perimeter firewalls primarily control traffic between network zones. Without internal segmentation controls, they may have limited visibility or enforcement within a single network segment or VLAN. This is due to different network architecture limitations with the existing legacy firewall model, making it difficult to provide effective ransomware protection. Once an attacker has compromised a machine on a single VLAN, they will eventually compromise another machine on the same VLAN and use it to leapfrog to other assets in the data center, including backup servers.

How to detect and block ransomware threats

As a defender, you want to limit access between machines as much as possible to prevent lateral movement. Specifically around the protocols and services ransomware campaigns often exploit. “In many environments, direct communication between user endpoints should be minimized, and SMB access should be restricted only to systems that require it, such as file servers or domain controllers..

Our segmentation solutions allow the defender to limit traffic between any two machines. Because the platform uses a software-based segmentation approach, you can create policies that block communication between laptops or limit SMB traffic between domain members and allow them only to access specific servers like the domain controller.

Additionally, Akamai provides visibility, down to the process level, of communications and dependencies between your assets. This enables you to assess risk ahead of time and develop proactive strategies for protecting critical assets and high-risk components such as backups. 

The platform also comes with robust threat detection capabilities, so you can look for communication with known malicious domains or the presence of known malicious processes in your environment that may indicate a malware breach.

Read more in our blog post 4 Techniques for Early Ransomware Detection

What should I do if I’m attacked by ransomware?

Because ransomware relies on lateral movement to execute a successful attack, that’s where organizations should focus their effort. If you determine that an active ransomware attack is in progress, use tools that provide visibility to understand the breach’s scope. Based on what you learn, you can then isolate affected parts of the network from the rest of the organization and add more security layers to critical applications and backups. Only once you have taken mitigation steps and restored services should you gradually re-enable communication flows.

Once you have a list of all infected systems and IOCs (indicators of compromise), you can start disinfecting. Divide your machines into three label groups: Isolated, Monitored and Clean.

Read more in our blog post Stopping Ransomware and Lateral Movement with Segmentation

How does crypto ransomware work?

A ransomware attack begins with an initial breach, often enabled by social engineering, a phishing email, malicious email attachment or vulnerabilities in the network perimeter. Crypto ransomware will start to move through your network and attempt to maximize damage from its landing point. CryptoLocker was one of the earliest and most well-known examples of this type of ransomware. Typically, bad actors seek to seize control of a domain controller, compromise credentials and locate and encrypt any data backups in place to prevent operators from restoring infected and frozen services.

How do you find out what ransomware you have?

There are many different variants of ransomware. However, looking at the specific IOCs based on suspicious domain names, IP addresses and file hashes associated with known malicious activity can help you learn more about the attack’s origin and how to respond.This is particularly helpful when distinguishing between ransomware families, such as WannaCry ransomware or Ryuk.

What are the most common forms of ransomware?

Some campaigns are highly targeted operations conducted by organized cybercriminal groups, while others are opportunistic attacks that spread widely through automated scripts or phishing campaigns. Historically, ransomware has been grouped into two main categories: crypto-ransomware and locker ransomware. Modern campaigns often combine encryption with data theft and extortion.. Attacks that encrypt files and hold them for ransom payments are known as crypto-ransomware, and ransomware that prevents users from accessing a device is known as locker ransomware.

New types of ransomware, malicious code, malicious software, malicious attachments, scareware, and other new ransomware variants are appearing frequently in the wild. There are even documented cases of paid ransomware-as-a-service (RaaS), an example being REvil (Ransomware Evil; also known as Sodinokibi) which was a Russia-based or Russian-speaking private RaaS.

How did ransomware get started?

Ransomware has existed for decades. One of the earliest examples was the AIDS Trojan in 1989, distributed via floppy disks. Over time, attackers adopted new delivery methods including spam campaigns, exploit kits, and malvertising.. Ransomware did not really distinguish between who it was targeting – it targeted everyone and if these victims paid – great –  and if they didn’t it was fine because there were plenty of other fish in the sea.

However, other destructive malware campaigns also demonstrated how cyberattacks could disrupt large organizations. For example, the Shamoon attack against Saudi Aramco in 2012 used wiper malware that destroyed data rather than encrypting it for ransom. Shamoon was destructive wiper malware that overwrote the master boot record of infected systems, rendering thousands of machines unusable and disrupting operations. This loss of functionality caused a substantial amount of downtime for the company.

Locky was ransomware malware released in 2016. It is delivered by email (that is allegedly an invoice requiring payment) with an attached Microsoft Word document that contains malicious macros. When the user opens the document, it appears to be full of gibberish, and includes the phrase "Enable macro if data encoding is incorrect," a social engineering technique.

Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in bitcoin in order to regain access to the system.

How did ransomware evolve?

Fast forward to 2017. WannaCry and NotPetya, two devastating ransomware attacks, wreaked havoc on large corporations and government entities. The unique thing about these attacks, other than showing how fragile the internet is, was that these attacks spread rapidly by exploiting vulnerabilities in the Windows Server Message Block (SMB) protocol, allowing the malware to propagate automatically across networks in a virulent way. A lot was written about NotPetya and WannaCry, and subsequent investigations attributed WannaCry to North Korea’s Lazarus Group and NotPetya to Russian state-linked actors.

These ransomware attacks then started being used by crimeware groups, which until that point were mostly focused on using malware like Zeus (and all of its variants) to breach people’s bank accounts to siphon money. This was often a long, complicated, and risky operation – especially when it came to actually receiving the money. Until now, the prevailing belief was just that it could be easier to target only large corporations and blackmail them into sending large amounts of money in bitcoin, which made ransomware more of a corporate threat that needs to worry CISOs, but not necessarily unsuspecting private citizens.

Ryuk is the name of a ransomware family, first discovered in the wild in August 2018. Named after a fictional character in a popular Japanese comic book and cartoon series, it is now known as one of the nastiest ransomware families to ever plague systems worldwide.

Now jump to 2020. While the COVID-19 pandemic rages on around the world and most people are forced into working from home, completely changing threat models, risk factors and network architectures on very short notice, the world started seeing ransomware attack operators change their modus operandi. They were now targeting large companies by conducting a double extortion attack, where the attackers not only breach the organization, encrypt the files and hold them as hostage — but they also started exfiltrating that precious and highly valuable data back to the attackers, threatening to make this data publicly available if the ransom is not paid.

Executive order promotes segmentation for slowing ransomware
In 2021, the U.S. government’s Executive Order on Improving the Nation’s Cybersecurity highlighted stronger security practices — including segmentation, patching, and multifactor authentication — as part of efforts to reduce ransomware risk.

Network segmentation helps not only to mitigate the risk in some cases, but also to significantly lower the risk of a double extortion attack if implemented properly, by containing and minimizing the “blast radius” of a ransomware attack. Even if antivirus software and EDRs (link to  failed to prevent the ransomware from executing, proper segmentation will keep that damage contained and won’t allow the attackers to move laterally across the network to steal more sensitive data and encrypt more machines.

The granularity of segmenting a network with Akamai’s unique software approach allows you to create “network silos” between servers, applications, different operating systems, cloud instances and so on. The strength of lowering ransomware risk by using a proper segmentation policy comes from its simplicity — a bit can either travel on the wire (or a Vswitch) to a different machine (or a VM/container) or it can be blocked,  rendering the attackers’ attempt to reach more resources on the network useless, giving the blue team more time to respond to the attack and update the key stakeholders in the organization so they can make informed decisions about the damage of said attack.

Network segmentation is not an alternative to an antivirus, antimalware or an EDR platform, it is a supplemental approach that has proven to significantly reduce, if not to completely eliminate the risk of large scale lateral movement based attacks across organizations.

Read more in our blog post EDR vs. Segmentation: Understanding the Differences

How do you combat the ransomware threat?

This new age of ransomware attacks shines a light on a problem that has been long overdue from solving: lateral movement.

In order for the attackers to exfiltrate all of that data, they have to know where it is on the network — and in order to know that, they have to map the network and know it just as good (if not better) than the people who had originally built it. This requires the attackers to “move laterally” from one machine/server to another, often using different credentials by stealing them from various machines across the network.

Many cybersecurity vendors tried to solve this problem, and some succeeded more than others. The security market has seen new types of products emerge over the years to prevent this very problem – from DLP solutions to EDRs and EPPs – they all have tried but had very partial success in solving the problem of lateral movement.

Solving lateral movement is hard — attackers are using the features of a network against itself.

They will use administrator credentials and various legitimate administrative tools (such as Microsoft’s own Psexec or Remote Desktop, or even WMI) moving from machine to machine, executing malicious commands and payloads in order to steal data and later encrypt the network and start the extortion operation. Many organizations are investing resources in trying to put a Band-Aid on this problem by overly monitoring various resources using EDR/EPP products that weren’t meant to be used for that purpose, thus resulting in partial success of mitigating or even lowering the risk of a ransomware attack.

Halting lateral movement with segmentation

However, there is a solution and it’s much simpler to implement than you may think — network segmentation. Segmentation is something that’s often forgotten or even ignored altogether since it’s believed to be hard to implement, and requires careful attention to network engineering and asset management. Because of this, network segmentation is often disregarded, which leaves networks “flat,” meaning every endpoint or server can talk to each other without any restriction.

Until recently, segmenting a network meant putting different assets in different subnets with a firewall in the middle. This didn’t allow any granularity, made managing the network significantly harder, and required administrators to manage complex firewall configurations along with managing IP address allocations on different subnets, which then made designing and scaling the network much harder for the IT staff, while incorrect configurations could lead to either a security risk or a network failure (and, in some cases, even to both!). This, again, caused IT staff to not put an emphasis on segmentation and put much more trust on execution prevention products while leaving the network completely flat and unsegmented.

Frequently Asked Questions

A ransomware attack begins when malware infects a system, often through phishing, a malicious attachment, or stolen credentials. The ransomware encrypts files on the infected system and may spread laterally across the network. A ransom note is then displayed demanding payment — usually in cryptocurrency — in exchange for a private key to decrypt the files.

Law enforcement agencies, including the FBI, generally discourage paying a ransom. Payment does not guarantee that attackers will provide a working decryption key, and it may encourage further cybercrime. Organizations should instead focus on containment, recovery, and working with cybersecurity professionals and authorities.

Yes. Many ransomware variants are designed to move laterally across a network after the initial infection. By exploiting stolen credentials or vulnerabilities, attackers can encrypt multiple systems, backups, servers, and even mobile devices — significantly increasing the damage.

Locker ransomware blocks access to a device, preventing users from logging in. Encrypting ransomware locks individual files by encrypting them and requiring a private key for recovery. Encryption ransomware is generally more damaging because it targets business-critical data.

Why customers choose Akamai

Akamai is the cybersecurity and cloud computing company that powers and protects business online. Our market-leading security solutions, superior threat intelligence, and global operations team provide defense in depth to safeguard enterprise data and applications everywhere. Akamai’s full-stack cloud computing solutions deliver performance and affordability on the world’s most distributed platform. Global enterprises trust Akamai to provide the industry-leading reliability, scale, and expertise they need to grow their business with confidence.

Related Blog Posts

Anatomy of a SYN-ACK Attack
Learn how the TCP SYN-ACK attack vector reflection works, why it’s uncommon, and concerns it raises for security.
How to Defend Against Relentless DNS Attacks
Enterprise organizations, their employees, and their customers are better protected from cyberattacks when their DNS is properly secured.
Akamai Prolexic Now Offers Cloud, On-Prem, and Hybrid DDoS Protection
Akamai Prolexic introduces two new options, Prolexic On-Prem (powered by Corero) and Prolexic Hybrid, which extend Akamai’s cloud-based DDoS defense solution.

Related Customer Stories

Explore all Akamai Security Solutions

Start your free trial and see what a difference having the world’s largest and most trusted cloud delivery platform can make.