Protecting Your organization from WannaCry Ransomware

Quick Heal Technologies Ltd.
Quick Heal Technologies Ltd.Quick Heal Technologies Ltd.
Protecting Your
Organization from
WannaCry Ransomware
Presenter
Mayank Dikshit
Senior Manager , Quality Assurance
Windows, Mac, Linux,
Quick Heal
Overview of Ransomware
•Infection vectors and Targeted Files
•Payment Mechanisms
•New Techniques used by Ransomware
•Industries affected
Agenda
How Seqrite protects against WannaCry
•Layered Protection
•Statistics
Prevention Steps
•WannaCry Specific
•General
Overview of WannaCry Ransomware
•How WannaCry Propagates
•Targeted Files
Digital extortion
• Encryption
Encrypts files with a password, stopping from opening them
• Lock screen
Uses a full-screen image or webpage to stop from accessing anything on
computer
• MBR
Overview of Ransomware
• Email attachments
• Phishing links
• Part of another malware's payload
• Delivered by an exploit kit
• Malvertising
• Through Vulnerabilities found in:
• Applications
• Plug-ins (like Adobe, Flash Player)
• Operating System
Infection Vectors
Office files PDF files Database files
Images & Drawings Games files
Targeted Files
Payment Mechanisms
SMSs or phone calls
to premium-rate
numbers
Prepaid electronic
payment – Ukash,
MoneyPack, PayPal
My Cash Cards
Bitcoins – virtual
currency which makes
it difficult to trace the
actual recipient of the
money
New Techniques used by Ransomwares
• RDP (Remote Desktop) – Brute Force Attacks
• Exploiting Server Vulnerabilities
• Hooking to popular Third Party Software/Tools
Industries affected
• Educational Institutions
• Government Organizations
• Corporates and Businesses
• Hospitals
• Telecom
• Transport
WannaCry Ransomware
• The ransomware, WannaCry, uses an exploit named EternalBlue
Server Message Block (SMB) Vulnerability [MS17-010–Critical] to
infect computers running versions of Windows operating systems.
• EternalBlue was first made public in April 2017 after Shadow
Brokers released a bunch of exploits and hacking tools developed
by the US NSA.
• Microsoft released a patch for the EternalBlue exploit just a few
weeks before Shadow Brokers made the NSA-developed
vulnerability's existence public.
• In addition to ‘EternalBlue’, ‘EternalRomance’ and
‘EternalSynergy’ were also addressed by Microsoft as part of
security bulletin MS17-010.
How does WannaCry Propagate?
• What makes it lethal is the combination of a Worm with
Ransomware.
• Generates list of:
• Internal IPs [Local Network]
• Random IPs [Internet/External Networks]
WannaCry Ransomware
• After successful exploitation, it adds the below files to the system:
C:ProgramData<random_alphanumeric>@WanaDecryptor@.exe
C:ProgramData<random_alphanumeric>tasksche.exe
C:ProgramData<random_alphanumeric>taskdl.exe
C:ProgramData<random_alphanumeric>taskse.exe
• WannaCry adds below malicious registry entries to make persistence into
the system, so that it could launch the infection after each system reboot:
[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun]
“xwjfzbtm432″=””C:ProgramData<random_alphanumeric>tasksche.exe“”
• WannaCry then encrypts all the data on the system by changing file
extension names to '.WNCRY'.
• The ransomware then displays a window informing users that their files
have been encrypted and that they can be recovered in lieu of a payment
made in bitcoins. The window is accompanied by two timers:
• one counting down to a certain time after which the ransom amount
will be doubled.
• other warns of the time after which users' files will be lost.
• Commonly used office file extensions (.ppt, .doc, .docx, .xlsx).
• Archives (.zip, .rar, .tar)
• Emails and email databases (.eml, .msg, .ost, .pst).
• Database files (.sql, .sqlitedb, .accdb, .mdb, .dbf, .odb, .myd).
• Media files like image, audio and video (.jpeg, .mp4.,mpeg)
• Graphic designers, artists and photographers files (.vsd, .odg, .raw,
.nef, .svg, .psd).
• Virtual machine files (.vmx, .vmdk, .vdi).
• Encryption keys and certificates (.key, .pfx, .pem, .p12, .csr, .gpg,
.aes).
• Developers' sourcecode and project files (.php, .java, .cpp, .pas,
.asm).
Targeted Files
Behavior
based
detection
Signature
based
detection
Backup and
Restore
Internet and
Network
How Seqrite protects against WannaCry?
Ransomware ProtectionIntrusion Prevention
Detection Prompt
Shadow Broker Statistics - IPS
WannaCry – HeatMap and Attacker IPs
ETERNALCHAMPION Windows SMB Information Disclosure Vulnerability
EXPLODINGCAN WEB-MISC IIS v6 WebDAV ScStoragePathFromUrl Buffer
overflow attempt
ECLIPSEDWING Remote Code Execution Exploit
ETERNALROMANCE Remote Code Execution Exploit
ETERNALBLUE SMBv2 exploit
ETERNALCHAMPION Windows SMB Remote Code Execution Vulnerability
DOUBELPULSER backdoor - SHELLCODE BACKDOOR
Quick Heal & Seqrite detections specifc to MS17-010 :
VID-01899 : [MS17-010] Windows SMB Remote Code Execution Vulnerability
VID-01901 : [MS17-010] Windows SMB Remote Code Execution Vulnerability
VID-01906 : [MS17-010] Windows SMB Remote Code Execution Vulnerability
VID-01907 : [MS17-010] Windows SMB Remote Code Execution Vulnerability
VID-01912 : [MS17-010] Windows SMB Information Disclosure Vulnerability
Shadow Broker Exploit Coverage
How Seqrite protects against WannaCry
Behavior based detection
- Advance DNAScan
- Anti Ransomware
Anti-Ransomware
Detection Prompts
Behavior Detection System
Signature based detection
- Virus Protection
- Email Scan Protection
How Seqrite protects against WannaCry
Detection Prompt
Key Highlights
The feature requires Seqrite product to be already installed and activated. It is
downloaded as part of updates and no specific user action is required.
Backup and Restore feature is lightweight and works seamlessly in the background
to back-up your data without any performance overheads.
It automatically and periodically (multiple times in a day), takes incremental
backup of all your important and well-known file formats - PDF, Microsoft Office ,
Open Office files.
Keeps a backup of your files on the local drive itself and at no point this data is
either shared or transferred to Seqrite cloud.
To restore data Seqrite Technical Support provides all assistance.
Backup and Restore
Preventive Steps
Regular backup of
important data
Apply
MS17-010 Security
updates.
Keep your Security
product Up-to-date
Follow best security
practices
MS17-010 Security Updates
Apply Security Update for Microsoft Windows SMB Server :
https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
# ‘Windows XP SP3’ ‘KB4012598’
# 'Windows Vista', 'KB4012598'
# 'Windows 7', 'KB4012212', 'KB4012215'
# 'Windows 8.1', 'KB4012213', 'KB4012216'
# 'Windows 10', 'KB4012606'
# 'Windows 10 Version 1511', 'KB4013198'
# 'Windows 10 Version 1607', 'KB4013429'
# 'Windows Server 2008', 'KB4012598'
# 'Windows Server 2008 R2', 'KB4012212', 'KB4012215'
# 'Windows Server 2012', 'KB4012214', 'KB4012217'
# 'Windows Server 2012 R2', 'KB4012213', 'KB4012216'
# 'Windows Server 2016', 'KB4013429'
• Apply the latest security updates released by Quick Heal/Seqrite.
• Disable SMB service (running on port 445) if not used.
• Use strong and unique passwords.
• Disable RDP or change the default RDP port number.
• 2-Factor Authentication for Remote Services
• Configure Account Lockout Policies
• Disable Macros in Microsoft Office via Group Policy
• Configure password protection for your security software
Preventive Steps
• Ensure that Windows Update is enabled to automatically download and
apply regular security updates. Also ensure that your system has the
latest Windows security patches installed. Also apply updates for
important software which is regularly targeted, such as:
• Microsoft Office
• Java
• Adobe Acrobat Reader
• Web browsers like Internet Explorer, Chrome, Firefox, Opera etc
• Adobe Flash Player
Applying important software updates
• It is very important to understand the need for data backup policies
for all your important data.
• It is highly recommended that you periodically backup your important
data using the right combination of ONLINE and OFFLINE backups.
• Do not keep offline backups connected to your system as this data
could be encrypted in case of an infection.
Regular backup of important data
1. Keep strong passwords for login accounts and network shares.
2. Do not open and execute attachments received from unknown
senders. Cybercriminals use ‘Social Engineering’ techniques to allure
users to open attachments or to click on links containing malware.
3. Avoid downloading software from untrusted P2P or torrent sites. At
times, they are Trojanized with malicious software.
4. Do not download cracked software as they could propagate the
added risk of opening a backdoor entry for malware into your system.
5. Do not download pirated/free software from unknown and un-trusted
sites.
6. It is recommended to avoid mapping of network drives in the system.
7. Do not use untrusted plugins/add-ons/extensions on browsers.
8. Do not use important Servers for daily browsing/mailing activities.
9. Avoid browsing, downloading when you are logged-in with complete
administrator rights.
Follow best Security Practices
Q&A
Call us at:
1800-212-7377
Write to us at:
support@seqrite.com
Visit us:
www.seqrite.com | blogs.seqrite.com
Thank You!
1 sur 32

Recommandé

WannaCry ransomware attack par
WannaCry ransomware attackWannaCry ransomware attack
WannaCry ransomware attackAbdelhakim Salama
763 vues15 diapositives
Ransomware: Wannacry par
Ransomware: WannacryRansomware: Wannacry
Ransomware: WannacryMikel Solabarrieta
3.2K vues19 diapositives
Ransomware par
RansomwareRansomware
RansomwareDeepakKumar4980
226 vues16 diapositives
WannaCry Ransomware par
 WannaCry Ransomware WannaCry Ransomware
WannaCry RansomwareZoho Corporation
5.6K vues10 diapositives
Wannacry par
WannacryWannacry
WannacryGunther Clauwaert
629 vues14 diapositives
Wannacry par
WannacryWannacry
WannacryAravindVV
174 vues26 diapositives

Contenu connexe

Tendances

Ransomware par
RansomwareRansomware
RansomwareAkshita Pillai
12.6K vues29 diapositives
Understanding ransomware par
Understanding ransomwareUnderstanding ransomware
Understanding ransomwarePrathan Phongthiproek
327 vues28 diapositives
Computer Worms par
Computer WormsComputer Worms
Computer Wormssadique_ghitm
14.2K vues20 diapositives
Mobile protection par
Mobile protection Mobile protection
Mobile protection preetpatel72
1.5K vues20 diapositives
Social engineering attacks par
Social engineering attacksSocial engineering attacks
Social engineering attacksRamiro Cid
5.9K vues22 diapositives
Analysing Ransomware par
Analysing RansomwareAnalysing Ransomware
Analysing RansomwareNapier University
844 vues45 diapositives

Tendances(20)

Social engineering attacks par Ramiro Cid
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid5.9K vues
Ransomware Resiliency, Recoverability and Availability par Lai Yoong Seng
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
Lai Yoong Seng1.2K vues
Mobile security in Cyber Security par Geo Marian
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
Geo Marian9.8K vues
UTM Unified Threat Management par Lokesh Sharma
UTM Unified Threat ManagementUTM Unified Threat Management
UTM Unified Threat Management
Lokesh Sharma2.7K vues
Cyber crime and cyber security par Keshab Nath
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath5.2K vues
The rise of malware(ransomware) par phexcom1
The rise of malware(ransomware)The rise of malware(ransomware)
The rise of malware(ransomware)
phexcom1492 vues

Similaire à Protecting Your organization from WannaCry Ransomware

WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN par
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
526 vues17 diapositives
Best practices to secure Windows10 with already included features par
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included featuresAlexander Benoit
513 vues32 diapositives
Penetration Testing Basics par
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
12.7K vues62 diapositives
Workshop on BackTrack live CD par
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
3.2K vues25 diapositives
Kunal - Introduction to backtrack - ClubHack2008 par
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
859 vues25 diapositives
Kunal - Introduction to BackTrack - ClubHack2008 par
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
412 vues25 diapositives

Similaire à Protecting Your organization from WannaCry Ransomware(20)

Best practices to secure Windows10 with already included features par Alexander Benoit
Best practices to secure Windows10 with already included featuresBest practices to secure Windows10 with already included features
Best practices to secure Windows10 with already included features
Alexander Benoit513 vues
Penetration Testing Basics par Rick Wanner
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
Rick Wanner12.7K vues
Kunal - Introduction to backtrack - ClubHack2008 par ClubHack
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack859 vues
Kunal - Introduction to BackTrack - ClubHack2008 par ClubHack
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack412 vues
Cisco Security Presentation par Simplex
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
Simplex4K vues
Ransomware: WanaCry, WanCrypt par Yash Diwakar
Ransomware: WanaCry, WanCryptRansomware: WanaCry, WanCrypt
Ransomware: WanaCry, WanCrypt
Yash Diwakar380 vues
PoS Malware and Other Threats to the Retail Industry par Invincea, Inc.
PoS Malware and Other Threats to the Retail IndustryPoS Malware and Other Threats to the Retail Industry
PoS Malware and Other Threats to the Retail Industry
Invincea, Inc.1.1K vues
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security... par Robert Conti Jr.
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.277 vues
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme... par M Mehdi Ahmadian
 هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme... هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
هک پایگاه داده و راهکارهای مقابلهDatabases hacking, safeguards and counterme...
M Mehdi Ahmadian925 vues
ransomware keylogger rootkit.pptx par dawitTerefe5
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
dawitTerefe558 vues
Ransomware- What you need to know to Safeguard your Data par Inderjeet Singh
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh3.9K vues
Atc ny friday-talk_20080808 par Todd Deshane
Atc ny friday-talk_20080808Atc ny friday-talk_20080808
Atc ny friday-talk_20080808
Todd Deshane370 vues
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i... par Alexander Benoit
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Experts Live Europe 2017 - Best Practices to secure Windows 10 with already i...
Alexander Benoit775 vues
SplunkLive! Stockholm 2015 breakout - Analytics based security par Splunk
SplunkLive! Stockholm 2015 breakout - Analytics based securitySplunkLive! Stockholm 2015 breakout - Analytics based security
SplunkLive! Stockholm 2015 breakout - Analytics based security
Splunk685 vues

Plus de Quick Heal Technologies Ltd.

Digital Threat Landscape par
Digital Threat LandscapeDigital Threat Landscape
Digital Threat LandscapeQuick Heal Technologies Ltd.
1K vues9 diapositives
Cybersecurity in Banking Sector par
Cybersecurity in Banking SectorCybersecurity in Banking Sector
Cybersecurity in Banking SectorQuick Heal Technologies Ltd.
8.7K vues15 diapositives
31 Internet Security Tips on CyberSecurity Month Ocotober par
31 Internet Security Tips on CyberSecurity Month Ocotober31 Internet Security Tips on CyberSecurity Month Ocotober
31 Internet Security Tips on CyberSecurity Month OcotoberQuick Heal Technologies Ltd.
570 vues1 diapositive
How a Ransomware Infects your Computer [INFOGRAPHIC] par
How a Ransomware Infects your Computer [INFOGRAPHIC]How a Ransomware Infects your Computer [INFOGRAPHIC]
How a Ransomware Infects your Computer [INFOGRAPHIC]Quick Heal Technologies Ltd.
892 vues1 diapositive
Next-Gen Security Solution: Gateway Protection par
Next-Gen Security Solution: Gateway ProtectionNext-Gen Security Solution: Gateway Protection
Next-Gen Security Solution: Gateway ProtectionQuick Heal Technologies Ltd.
497 vues17 diapositives
Centralized Patch Management - Proven Security Approach for Ransomware Protec... par
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Centralized Patch Management - Proven Security Approach for Ransomware Protec...
Centralized Patch Management - Proven Security Approach for Ransomware Protec...Quick Heal Technologies Ltd.
729 vues18 diapositives

Plus de Quick Heal Technologies Ltd.(20)

Dernier

KVM Security Groups Under the Hood - Wido den Hollander - Your.Online par
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
221 vues19 diapositives
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... par
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
139 vues29 diapositives
MVP and prioritization.pdf par
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 vues8 diapositives
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... par
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
161 vues13 diapositives
Why and How CloudStack at weSystems - Stephan Bienek - weSystems par
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsShapeBlue
238 vues13 diapositives
LLMs in Production: Tooling, Process, and Team Structure par
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team StructureAggregage
42 vues77 diapositives

Dernier(20)

KVM Security Groups Under the Hood - Wido den Hollander - Your.Online par ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue221 vues
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti... par ShapeBlue
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
ShapeBlue139 vues
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... par ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue161 vues
Why and How CloudStack at weSystems - Stephan Bienek - weSystems par ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue238 vues
LLMs in Production: Tooling, Process, and Team Structure par Aggregage
LLMs in Production: Tooling, Process, and Team StructureLLMs in Production: Tooling, Process, and Team Structure
LLMs in Production: Tooling, Process, and Team Structure
Aggregage42 vues
"Surviving highload with Node.js", Andrii Shumada par Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays56 vues
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... par The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... par BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 vues
"Package management in monorepos", Zoltan Kochan par Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays33 vues
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue par ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue222 vues
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue par ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue147 vues
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... par ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue173 vues
The Power of Heat Decarbonisation Plans in the Built Environment par IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE79 vues
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... par ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue180 vues
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... par ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue106 vues
"Running students' code in isolation. The hard way", Yurii Holiuk par Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 vues
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... par ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue166 vues

Protecting Your organization from WannaCry Ransomware

  • 2. Presenter Mayank Dikshit Senior Manager , Quality Assurance Windows, Mac, Linux, Quick Heal
  • 3. Overview of Ransomware •Infection vectors and Targeted Files •Payment Mechanisms •New Techniques used by Ransomware •Industries affected Agenda How Seqrite protects against WannaCry •Layered Protection •Statistics Prevention Steps •WannaCry Specific •General Overview of WannaCry Ransomware •How WannaCry Propagates •Targeted Files
  • 4. Digital extortion • Encryption Encrypts files with a password, stopping from opening them • Lock screen Uses a full-screen image or webpage to stop from accessing anything on computer • MBR Overview of Ransomware
  • 5. • Email attachments • Phishing links • Part of another malware's payload • Delivered by an exploit kit • Malvertising • Through Vulnerabilities found in: • Applications • Plug-ins (like Adobe, Flash Player) • Operating System Infection Vectors
  • 6. Office files PDF files Database files Images & Drawings Games files Targeted Files
  • 7. Payment Mechanisms SMSs or phone calls to premium-rate numbers Prepaid electronic payment – Ukash, MoneyPack, PayPal My Cash Cards Bitcoins – virtual currency which makes it difficult to trace the actual recipient of the money
  • 8. New Techniques used by Ransomwares • RDP (Remote Desktop) – Brute Force Attacks • Exploiting Server Vulnerabilities • Hooking to popular Third Party Software/Tools
  • 9. Industries affected • Educational Institutions • Government Organizations • Corporates and Businesses • Hospitals • Telecom • Transport
  • 10. WannaCry Ransomware • The ransomware, WannaCry, uses an exploit named EternalBlue Server Message Block (SMB) Vulnerability [MS17-010–Critical] to infect computers running versions of Windows operating systems. • EternalBlue was first made public in April 2017 after Shadow Brokers released a bunch of exploits and hacking tools developed by the US NSA. • Microsoft released a patch for the EternalBlue exploit just a few weeks before Shadow Brokers made the NSA-developed vulnerability's existence public. • In addition to ‘EternalBlue’, ‘EternalRomance’ and ‘EternalSynergy’ were also addressed by Microsoft as part of security bulletin MS17-010.
  • 11. How does WannaCry Propagate? • What makes it lethal is the combination of a Worm with Ransomware. • Generates list of: • Internal IPs [Local Network] • Random IPs [Internet/External Networks]
  • 12. WannaCry Ransomware • After successful exploitation, it adds the below files to the system: C:ProgramData<random_alphanumeric>@WanaDecryptor@.exe C:ProgramData<random_alphanumeric>tasksche.exe C:ProgramData<random_alphanumeric>taskdl.exe C:ProgramData<random_alphanumeric>taskse.exe • WannaCry adds below malicious registry entries to make persistence into the system, so that it could launch the infection after each system reboot: [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] “xwjfzbtm432″=””C:ProgramData<random_alphanumeric>tasksche.exe“” • WannaCry then encrypts all the data on the system by changing file extension names to '.WNCRY'. • The ransomware then displays a window informing users that their files have been encrypted and that they can be recovered in lieu of a payment made in bitcoins. The window is accompanied by two timers: • one counting down to a certain time after which the ransom amount will be doubled. • other warns of the time after which users' files will be lost.
  • 13. • Commonly used office file extensions (.ppt, .doc, .docx, .xlsx). • Archives (.zip, .rar, .tar) • Emails and email databases (.eml, .msg, .ost, .pst). • Database files (.sql, .sqlitedb, .accdb, .mdb, .dbf, .odb, .myd). • Media files like image, audio and video (.jpeg, .mp4.,mpeg) • Graphic designers, artists and photographers files (.vsd, .odg, .raw, .nef, .svg, .psd). • Virtual machine files (.vmx, .vmdk, .vdi). • Encryption keys and certificates (.key, .pfx, .pem, .p12, .csr, .gpg, .aes). • Developers' sourcecode and project files (.php, .java, .cpp, .pas, .asm). Targeted Files
  • 14. Behavior based detection Signature based detection Backup and Restore Internet and Network How Seqrite protects against WannaCry? Ransomware ProtectionIntrusion Prevention
  • 17. WannaCry – HeatMap and Attacker IPs
  • 18. ETERNALCHAMPION Windows SMB Information Disclosure Vulnerability EXPLODINGCAN WEB-MISC IIS v6 WebDAV ScStoragePathFromUrl Buffer overflow attempt ECLIPSEDWING Remote Code Execution Exploit ETERNALROMANCE Remote Code Execution Exploit ETERNALBLUE SMBv2 exploit ETERNALCHAMPION Windows SMB Remote Code Execution Vulnerability DOUBELPULSER backdoor - SHELLCODE BACKDOOR Quick Heal & Seqrite detections specifc to MS17-010 : VID-01899 : [MS17-010] Windows SMB Remote Code Execution Vulnerability VID-01901 : [MS17-010] Windows SMB Remote Code Execution Vulnerability VID-01906 : [MS17-010] Windows SMB Remote Code Execution Vulnerability VID-01907 : [MS17-010] Windows SMB Remote Code Execution Vulnerability VID-01912 : [MS17-010] Windows SMB Information Disclosure Vulnerability Shadow Broker Exploit Coverage
  • 19. How Seqrite protects against WannaCry Behavior based detection - Advance DNAScan - Anti Ransomware
  • 21. Signature based detection - Virus Protection - Email Scan Protection How Seqrite protects against WannaCry
  • 23. Key Highlights The feature requires Seqrite product to be already installed and activated. It is downloaded as part of updates and no specific user action is required. Backup and Restore feature is lightweight and works seamlessly in the background to back-up your data without any performance overheads. It automatically and periodically (multiple times in a day), takes incremental backup of all your important and well-known file formats - PDF, Microsoft Office , Open Office files. Keeps a backup of your files on the local drive itself and at no point this data is either shared or transferred to Seqrite cloud. To restore data Seqrite Technical Support provides all assistance. Backup and Restore
  • 24. Preventive Steps Regular backup of important data Apply MS17-010 Security updates. Keep your Security product Up-to-date Follow best security practices
  • 25. MS17-010 Security Updates Apply Security Update for Microsoft Windows SMB Server : https://technet.microsoft.com/en-us/library/security/ms17-010.aspx # ‘Windows XP SP3’ ‘KB4012598’ # 'Windows Vista', 'KB4012598' # 'Windows 7', 'KB4012212', 'KB4012215' # 'Windows 8.1', 'KB4012213', 'KB4012216' # 'Windows 10', 'KB4012606' # 'Windows 10 Version 1511', 'KB4013198' # 'Windows 10 Version 1607', 'KB4013429' # 'Windows Server 2008', 'KB4012598' # 'Windows Server 2008 R2', 'KB4012212', 'KB4012215' # 'Windows Server 2012', 'KB4012214', 'KB4012217' # 'Windows Server 2012 R2', 'KB4012213', 'KB4012216' # 'Windows Server 2016', 'KB4013429'
  • 26. • Apply the latest security updates released by Quick Heal/Seqrite. • Disable SMB service (running on port 445) if not used. • Use strong and unique passwords. • Disable RDP or change the default RDP port number. • 2-Factor Authentication for Remote Services • Configure Account Lockout Policies • Disable Macros in Microsoft Office via Group Policy • Configure password protection for your security software Preventive Steps
  • 27. • Ensure that Windows Update is enabled to automatically download and apply regular security updates. Also ensure that your system has the latest Windows security patches installed. Also apply updates for important software which is regularly targeted, such as: • Microsoft Office • Java • Adobe Acrobat Reader • Web browsers like Internet Explorer, Chrome, Firefox, Opera etc • Adobe Flash Player Applying important software updates
  • 28. • It is very important to understand the need for data backup policies for all your important data. • It is highly recommended that you periodically backup your important data using the right combination of ONLINE and OFFLINE backups. • Do not keep offline backups connected to your system as this data could be encrypted in case of an infection. Regular backup of important data
  • 29. 1. Keep strong passwords for login accounts and network shares. 2. Do not open and execute attachments received from unknown senders. Cybercriminals use ‘Social Engineering’ techniques to allure users to open attachments or to click on links containing malware. 3. Avoid downloading software from untrusted P2P or torrent sites. At times, they are Trojanized with malicious software. 4. Do not download cracked software as they could propagate the added risk of opening a backdoor entry for malware into your system. 5. Do not download pirated/free software from unknown and un-trusted sites. 6. It is recommended to avoid mapping of network drives in the system. 7. Do not use untrusted plugins/add-ons/extensions on browsers. 8. Do not use important Servers for daily browsing/mailing activities. 9. Avoid browsing, downloading when you are logged-in with complete administrator rights. Follow best Security Practices
  • 30. Q&A
  • 31. Call us at: 1800-212-7377 Write to us at: support@seqrite.com Visit us: www.seqrite.com | blogs.seqrite.com

Notes de l'éditeur

  1. Ransomware is a sophisticated malware. It hijacks the victim’s system and renders it nonfunctional. The malware prevents the user from using any applications or even accessing the operating system itself, until the victim agrees to pay a certain amount of money. Encryption: The files are encrypted using complex encryption algorithms. Decryption is impossible without private keys. Some of the latest ransomwares use strong encryption (2,048-bit RSA key pair) for encrypting the data, it is highly effective because the encryption used is practically impossible to break.   As mentioned earlier since the techniques involve all the communication happening over anonymous network TOR and use of cyber currency Bitcoin. Lock Screen: These kind of ransomwares lock the screen and prevent access to your computer. MBR ransomware: infects the Master Boot Record (MBR), preventing the operating system from loading. Based on analysis, this malware copies the original MBR and overwrites it with its own malicious code.
  2. Ransomware is propagated through various modes or infection vectors: Email, Malvertising, and using exploit kits that search for system vulnerabilities and exploit them to plant malwares. Email Attachments and Phishing Links: Ransomware is propagated through spam email campaigns, these emails mostly appear to have important information which may draw the victim’s attention. Usually the victim performs one of the following three actions which results in the victim’s computer being compromised and ransomware being installed on the computer. Victim opens a malicious attachment with the mail, this action results in ransomware being installed directly on the victim’s computer. Victim opens an attachment which leads to a downloader being installed, the downloader then downloads the ransomware on the computer. Victim clicks an embedded phishing URL that points to a site with malicious code or an exploit kit which ultimately results in the ransomware being installed on the computer. Part of another malware&amp;apos;s payload Delivered by an exploit kit Exploit kits exploit vulnerabilities in software in order to install malware. The attackers compromise third-party web servers on the Internet and inject iframes into the web pages hosted on them. The iframes direct the victim’s browsers to the exploit kit servers which install the malwares on the unsuspecting victims. Malvertising Involves injecting malicious or malware-laden advertisements into legitimate online advertising networks and webpages. The user clicks on the attractive ads to visit the advertised site, instead the user is directly infected or redirected to a malicious site. These sites fool users into copying viruses that are disguised as Flash files. Through Vulnerabilities found in: Applications Plug-ins (like Adobe, Flash Player) Operating System
  3. Typically, ransomware encrypts a wide range of files extensions using complex encryption algorithms. Decryption is impossible without private keys. They encrypt Office Files, PDF files DB files, images and drawings, Games files. .df1, .v12, .xml, .zip, .3ds, .rar, .dvb, .db, .ahd, .cdb, .gdb, .old, .png, .odb, .ns2, .ns3, .olk, .ns4, .sdb, .wdb, .sdf, .ihx, .ods, .dwf, .dwg, .myd, .doc, .pwa, .eql, .dws, .nsf, .dwt, .rsd, .dp1, .fcd, .lgc, .btr, .dxf, .dxl, .docx, .azz, .ac$, .fdb, .rtf, .arx, .jtx, .txt, .phm, .zdb, .jpeg, .qbw, .his, .ask, .owg, .fid, .bmp, .daf, .eco, .tif, .xlsx, .db2, .db3, .dat, .pan, .atc, .sxg, .edb, .dbc, .dbf, .mdb, .mdf, .qdb, .ads, .udb, .dbs, .dbv, .mud, .dsk, .bok, .psd, .fol, .fp7, .sql, .4dd, .tcx, .dta, .crd, .ora, .qvd, .jpe, .jpg, .crt, .hdb, .pdb, .aft, .xld, .$er, .vhd, .pdf, .sbf, .pdm, .xls, .tdt, .nyf, .bib, .pub, .aws, .fic, .php
  4. There have been various payment mechanisms used to collect the ransom but the one that has clearly emerged as the favorite tool to collect money by hackers is the digital currency – BitCoin. When you pay something digitally, you use net banking, credit card or debit card. Now your information is attached to the card such as name, address, etc). However, the case is different with bitcoin. The transactions you make using the currency are completely anonymous. Whenever customers trade in bitcoin, a private key associated with their wallet is used to generate a bit of code. That code is publicly associated with customer transaction but with no personal identifying information. Thus, every transaction is recorded and securely signed in an open ledger that anyone can read and double-check. One of the probable reasons why hackers chose bitcoin as a form of payment is because - It protects identity.
  5. Ransomwares are evolving and deploying new techniques to carry out cyber attacks. We have observed that certain recent ransomwares use brute force to break into servers through Remote Desktop by exploiting the weak passwords. Once they have entry, they uninstall the Security products. There is also another set of tactics that malware creators use to avoid antivirus detection. Cyber criminals equip malware strains with the ability to detect sandboxing mechanisms by checking for specific registry entries, running processes, certain ports and additional relevant information. When malware detects that it’s running in a sandbox environment, it stops its activity making the AV believe it’s a harmless file.  While some hook onto to popular 3rd party tools available for free. 
  6. Literally, all industries are exposed to the Ransomware attacks, which leads to massive disruption to Business productivity. The ransomware attacks have the potential to bring down businesses to it’s knees. Individuals, educational institutions, government organizations, Corporates and Businesses and Hospitals; even law enforcement agencies have been victims. While there is a rise observed in targeted attacks, but overall, the cyber criminals look for ways they can spread through easily. Cyber criminals understand that systems are not often patched with latest security updates, effective data back strategies are still not widely used and practiced. In case of WannaCry, the initial news and reports appeared on BBC about dozens of hospitals in England were affected by ransomware, denying physicians access to patient medical records and causing surgery and other treatments to be delayed. The malware spread quickly on Friday, 12th May, with medical staff in the UK reportedly seeing computers go down &amp;quot;one by one&amp;quot;. You can very well visualize the kind of impact an attack like this can have and why it is so imperative to follow good security practices.
  7. The ransomware, WannaCry, uses an exploit named EternalBlue Server Message Block (SMB) Vulnerability [MS17-010–Critical] to infect computers running versions of Windows operating systems. Affected Windows systems include everything from Windows XP, Windows Vista, Windows 7, Windows 8.x, Windows 10 and Windows Server OS 2003, 2008, 2016. The Server Message Block (SMB) protocol is a network file sharing protocol that allows applications on a computer to read and write to files and to request services from server programs in a computer network. Using the SMB protocol, an application (or the user of an application) can access (read, create, and update) files or other resources at a remote server.  Remote code execution vulnerabilities exist in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests. An attacker who successfully exploited the vulnerabilities gains the ability to execute code on the target server. To exploit the vulnerability, in most situations, an unauthenticated attacker can send a specially crafted packet to a targeted SMBv1 server. EternalBlue was first made public in April 2017 after Shadow Brokers released a bunch of exploits and hacking tools developed by the US NSA. The Shadow Brokers is a hacker group who first appeared in the summer of 2016. They published several leaks containing hacking tools from the NSA, including several zero-day exploits. Interestingly, Microsoft released a patch for the EternalBlue exploit just a few weeks before Shadow Brokers made the NSA-developed vulnerability&amp;apos;s existence public. However, it is possible that several computers around the world, most likely including the ones targeted in the cyberattack, had failed to update their systems with the Microsoft patch.
  8. Most alarming, WannaCry did not spread across networks in the usual way, through people clicking on email attachments. Rather, once one Windows system was affected on a Windows network, WannaCry managed to propagate itself and infect other unpatched machines without any human interaction. Worms are standalone software and do not require a host program or human help to propagate. WannaCry is different from anything we&amp;apos;ve ever seen before as for the first time we are seeing the combination of a worm and a ransomware – union of old and new and that’s exactly what makes it not only lethal but also the ability to spread across the Internet/globe – a borderless network - at lightning speed. In many reports we’ve read that the malware generates a list of internal IPs. However, it has also been observed that the malware generates random IP addresses, just not limited to the local network. This gives it the ability to not only spread to other machines within the same network, but also across the Internet if sites allow NetBIOS packets from outside networks. This particular behavior and ability attributes to the widespread propagation of WannaCry Ransomware across the globe impacting 100+ countries. Due to this people were unsure about the initial infection vector of the Ransomware.
  9. Let us look at what WannaCry does once it reaches the system. It drops the listed files in the specified path. The Ransomware writes itself into a random character folder in the &amp;apos;ProgramData&amp;apos; folder with the file name &amp;quot;tasksche.exe&amp;quot; or in &amp;apos;C:\Windows\&amp;apos; folder with the file-name &amp;quot;mssecsvc.exe&amp;quot; and &amp;quot;tasksche.exe&amp;quot;. It then displays the message to the user. &amp;quot;WannaCry&amp;quot; - the ransomware, asked users to pay a $300 ransom in bitcoins. The ransom note indicates the payment amount will be doubled after three days. If payment is not made after seven days, the encrypted files will be deleted. Security experts warn there is no guarantee that access will be granted after payment.
  10. Here’s a list of targeted file extensions by WannaCry. WannaCry offers free decryption for some random number of files in the folder C:\Intel\&amp;lt;random folder name&amp;gt;\f.wnry. We have seen 10 files decrypted for free.
  11. Quick Heal and Seqrite users are protected from the vulnerabilities reported in security bulletin MS17-010. Seqrite has been relentlessly working to keep its users secure and protected from ransomware attacks. Updates (signatures) are regularly released, heuristic solution – Behavior Detection System (BDS), Anti-Ransomware features are also enhanced to protect users from new emerging and complex ransomwares to protect the users from ransomware attacks.
  12. Internet and Network security provides protection against web-based threats such as phishing URLS, malwares such as key loggers, and other intrusion attempts by rogue IPs from across the globe. These threats are eliminated in real time and access to malicious sites, phishing URLS and IPs is blocked by Quick Heal and Seqrite products. The robust firewall also lets you control external traffic coming to your computer as per your requirements and rules can be set. Here’s an information prompt displayed by the product when such an attack is blocked.
  13. We started seeing the IPS hits based on the exploits. Hits reported after May 09, 2017 shows a spike in the activity.
  14. The Shadow Broker have leaded various Exploits. Quick Heal and Seqrite products provide the protection and coverage against the list exploits. The products block all detections specifically, listed in MS 17-019 Security Bulletin.
  15. The indigenous DNAScan technology detects and eliminates new and unknown malicious threats and thereby, provides zero-day protection. DNAScan uses the below techniques: 1. Detection by Characteristics 2. Detection by Behavior Behavior detection system is a dynamic, signature-less and advanced pro-active protection that helps to eliminate new and unknown malicious threats in the system. It monitors the activity on the system and if finds anything suspicious then takes immediate action by suspending the application/process from executing further. This feature also helps to protect against new and unknown ransomwares. Quick Heal Total Security’s Anti-Ransomware feature is a robust and comprehensive solution specifically designed to detect/block ransomwares. Based on the behavior-based detection technology, it protects your computer and data in two ways. 2. It detects ransomware and blocks it. The following prompt is displayed to the user when suspicious ransomware activity is detected. Securely, automatically and transparently backs up your critical data, creating a secure digital locker on your computer, which is accessible only for the purpose of restoring your files. The Anti-Ransomware feature successfully blocked WannaCry and provided Zero day protection.
  16. Here are the detection prompts that are displayed when WannaCry Ransomware is detected by Advance DNAScan and Anti-Ransomware features. The users are recommended to take the BLOCK action on these prompts.
  17. Signature Based Detection On a daily basis, at least twice signatures are released to the clients running Quick Heal and Seqrite software through updates. As hundreds of new threats are identified daily, these new signatures help the products detect and block threats and keep your systems safe. Virus Protection provides real-time protection and defense. It’s up and running all the time to keep your system secure from any potential threats. Email Scan Protection is one of the first layer of protection. It is a known fact that vast majority of ransomwares are propagated through emails. The emails and attachments carrying the payload are not only carefully crafted but have an appealing subject line to lure the users into opening the malicious attachments. Email Scan has been successfully blocking a high percentage of ransomwares based on heuristics as well. While signature based detection is considered reactive, it’s important to note that the above features also block ransomwares based on heuristics, thereby providing zero day protection. Though in case of WannaCry the security experts believe that this vector wasn’t used to propagate.  
  18. Does not support mapped/network and removable drives. Though, files cannot be restored on a network location however, removable drives can be used to restore the data. Note that this feature will not be effective on a system in certain cases: Where files are already encrypted by a ransomware prior to installation of the feature. If system is affected by a full disk encrypting ransomware attack which is however rare.
  19. Using unpatched and unsupported software may increase the risk of proliferation of cybersecurity threats such as ransomware.
  20. # ‘Windows XP SP3’ ‘KB4012598’ # (&amp;apos;Windows Vista&amp;apos;, &amp;apos;KB4012598&amp;apos;), # (&amp;apos;Windows Server 2008&amp;apos;, &amp;apos;KB4012598&amp;apos;), # (&amp;apos;Windows 7&amp;apos;, &amp;apos;KB4012212&amp;apos;, &amp;apos;KB4012215&amp;apos;), # (&amp;apos;Windows Server 2008 R2&amp;apos;, &amp;apos;KB4012212&amp;apos;, &amp;apos;KB4012215&amp;apos;), # (&amp;apos;Windows 8.1&amp;apos;, &amp;apos;KB4012213&amp;apos;, &amp;apos;KB4012216&amp;apos;), # (&amp;apos;Windows Server 2012&amp;apos;, &amp;apos;KB4012214&amp;apos;, &amp;apos;KB4012217&amp;apos;), # (&amp;apos;Windows Server 2012 R2&amp;apos;, &amp;apos;KB4012213&amp;apos;, &amp;apos;KB4012216&amp;apos;), # (&amp;apos;Windows 10&amp;apos;, &amp;apos;KB4012606&amp;apos;), # (&amp;apos;Windows 10 Version 1511&amp;apos;, &amp;apos;KB4013198&amp;apos;), # (&amp;apos;Windows 10 Version 1607&amp;apos;, &amp;apos;KB4013429&amp;apos;), # (&amp;apos;Windows Server 2016&amp;apos;, &amp;apos;KB4013429&amp;apos;)
  21. Apply the latest security updates released by Quick Heal/Seqrite. Disable SMB service (running on port 445) if not used. – Use strong and unique passwords on user accounts that cannot be easily breached. Weak passwords like Admin, admin123, user, 123456, password, Pass@123, etc., can be easily brute-forced in the first few attempts itself. – Change the default RDP port from ‘3389’ to something else. Although a complete port scan would still show the open ports, this would prevent attacks that are targeting only the port 3389 by default. – 2-Factor Authentication for Remote Services – Configuring Account Lockout Policies that automatically lock the account after a specific number of failed attempts. This feature is available in Windows and the threshold can be customized as per the administrator. – Disable Macros in Microsoft Office via Group Policy – Configure password protection for your security software. This would prevent any unauthorized users from disabling or uninstalling it. Users can enable this feature from the Settings =&amp;gt; Password Protection.