In the event of attack detection, the first thing that needs to be done to stop the infection of other devices is simply disconnecting the infected devices from the network; however, it is unlikely that the administrators will detect the event of an Attack before it has spread beyond a single device. However, if the infection has happened, “one part of a wide-area network that WAN connection needs to be disconnected immediately”, and if the infection is on the subnetwork should be disconnected immediately. If there are servers with sensitive data connected with the infected devices, the servers also should be disconnected as soon as possible to prevent the loss of sensitive data.
Remove the Malware virus
If the device is isolated from the network, the next step is to remove the Malware or virus. For this purpose, an antivirus program can be used. It is doubtful that if the virus cannot be removed, there will be no other choice but to format the machine and restore it using the backups. If the device is free of attacks now, a full system scan needs to be done before connecting it back to the network.
examples of antivirus programs:- Kaspersky, Avira, Avast, Norton
The above image shows the interface of the Avira antivirus program. While providing antivirus protection these programs provide some other features such as performance optimization. Generally, these types of antivirus programs keep a database of known viruses, if found a match of an existing file is with the database, that file will be quarantined until action is taken.
Finding out how the infection was started.
And also, there are best practices that need to be followed to prevent the organization's data from being attacked
- Making regular backups- and keeping the systems up to date is the best way to recover a system from a ransomware attack. hear the administrators can perform making regular backups of highly critical files, and it is required to ensure you create offline backups that keep separate in a different physical location
if using a windows system, backups can be done via Control Panel>system and maintenance> Backup and Restore
It can be seen that here you can set up the backup or you can restore them from a previous backup
· If using a Linux system, there are lot of tools that can be used to get a backup
o Ex :- Dejadup , Grsync , TimeShift
Or simply you can create a backup of your whole Linux file system using
sudo tar czf /backup.tar.gz --exclude=/backup.tar.gz --exclude=/dev --exclude=/mnt --exclude=/proc --exclude=/sys --exclude=/tmp --exclude=/lost+found / command. This will create an archive of backup.
- Prevent Malware running on the devices- here is required to allow to use only trusted application running on the systems, and also strong anti-malware products need to be used, and also a security education training needs to be given to the people of the organizations
- Prevent Malware from delivering to the devices- here, the users must allow only the file types that users would expect to receive. and also, websites that are open to Malware need to be blocked
- Providing security awareness training to the working people in an organization is also highly important. By training the workers will be able to avoid being a victim of ransomware and other types of attacks. Therefore, this can be called a better practice because the attack will be prevented before it happens.
- Patching the running applications is also a best practice. Because the developers will regularly issue patches for the applications to protect them from attacks.
- Ensuring the email servers is also crucial by adding a few more security layers.
- Add allow and deny rules to the servers and set up timeouts for the sessions
- Add client control rules depending on the sender and the receiver.
- Add authentication to email servers.
- Using a smart hosting system.

2 Comments
Nice artical
ReplyDeleteThank you
Delete