Ransomware on Servers: Detection and Prevention using Trend Micro Deep Security

A Trend Micro White Paper I October 2017 Table of Contents INTRODUCTION ..................................................................................................................... 1 PART I: A BRIEF HISTORY OF RANSOMWARE .......................................................................... 2 Types of Ransomware ....................................................................................................................2 The Evolution of Ransomware ........................................................................................................3 PART II – HOW CRYPTO RANSOMWARE WORKS .................................................................... 4 Customized Vs. Standard Encryption Cryptosystems .......................................................................4 Symmetric Vs. Asymmetric Encryption ............................................................................................5 Key Management ...........................................................................................................................5 Key Generation & Delivery .............................................................................................................5 PART III – DEFENCE-IN-DEPTH STRATEGY ............................................................................... 8 General Best Security Practices .......................................................................................................8 Deploy Layered Security Controls Using Deep Security .................................................................. 11 Network Security Controls ............................................................................................................ 12 Deep Security: Firewall Recommendations >> ................................................................................... 12 Deep Security: Web Reputation Service Recommendations >> ......................................................... 13 Deep Security: Intrusion Prevention System Recommendations >> .................................................. 14 Malware Prevention & System Security Controls........................................................................... 15 Deep Security: Anti-Malware Recommendations >> .......................................................................... 16 Deep Security: Application Control Recommendations >>................................................................. 17 Deep Security: Integrity Monitoring Recommendations >> ............................................................... 18 CONCLUSION ....................................................................................................................... 19 Trend Micro White Paper Ransomware: Detection and Prevention using Trend Micro Deep Security A Trend Micro White Paper I October 2017 INTRODUCTION Intended Audience This paper is aimed at information security professionals looking to combat Ransomware on servers. It will provide guidance on how to adopt and implement safeguards to servers leveraging Trend Micro™ Deep Security™. It is expected that the reader is comfortable with common computing, security, and networking terminologies and topics. About This Paper This paper will assist in designing a “defense-in-depth” strategy to combat ransomware using Deep Security. We will first discuss the generic and the most effective IT strategies over the years against threats and then provide specific configuration guidance on how to leverage Deep Security modules, such as Intrusion Prevention System (IPS), firewall, application control, integrity monitoring and anti-malware, to help create a “defense-in-depth” strategy against ransomware. This paper is not intended or claimed to provide a “magic” solution to combat ransomware nor should it be believed that there is a single technology which will prevent all of the bad scenarios or the continued proliferation of ransomware. An information security professional’s job is to make it harder and increasingly frustrating for adversaries by adopting a “defense-in-depth” or “layered security model”. This model recommends “Detective”, “Preventive”, and “Forensic” defensive layers and we will see where Deep Security can fit into this model. Help and Support This paper is not meant to be a substitute for product documentation. For detailed information regarding installation, configuration, administration and usage of the Deep Security product, please refer to https://help.deepsecurity.trendmicro.com/. Page 1 | Trend Micro White Paper Ransomware: Detection and Prevention using Trend Micro Deep Security
Please complete the form to gain access to this content