By Claus Løppenthien, Senior Solutions Specialist, October 27, 2016. Updated March 2023


One of the big concerns for many years is ransomware, ransomware groups plus the concept of RaaS. Ransomware is a small piece of malware that will encrypt data on local hard drives as well as remote network shares. After the encryption is completed a ransom for the data is requested.

It’s important to understand that no file integrity monitoring tools can prevent or eradicate ransomware. The best way to avoid it is user awareness and updated mail and endpoint protection such as Logpoint AgentX.

When dealing with ransomware, one of the most important aspects is the time used to detect it. The longer ransomware is active in an enterprise, the larger its impact and the more costlier to recover.

Logpoint
Logpoint

Award winning SIEM

Share This Story

No single tool, even a SIEM, can prevent or eradicate ransomware completely. The very nature of a SIEM installation is to collect logs for something that has already happened.

An appropriate and well-configured SIEM installation with file integrity monitoring tools will significantly reduce the meantime to detect an outbreak, also reducing the costly meantime to recovery. This is done by always having a clear baseline of your enterprise, as well as the possibility to actually see in near real-time what is going on in the enterprise.

Ransomware examples 

To give you great examples of ransomware you can go no further than our Emerging Threats and Security Analysis blogs and reports. There are a ton of ransomware attacks out there and every month we release blogs and full reports which include mitigation strategies and also, playbooks for you to use to automate your processes:

Security Analysis: 

Emerging Threats blog, reports, including playbooks:  

Baseline

Baselining your enterprise is very important, this is the only way you can make an educated guess to determine if something is normal behavior or abnormal activity. In the case of ransomware, the baseline for the utilization of a file system is very important. This will help to quickly identify any spike in file creation, renaming, or deletions by a specific user or process. Depending on the log data available, both user name and source IP can quickly be identified as well as all files affected through file integrity monitoring.

Below are some of the most common ways of monitoring file systems in an enterprise:

File Integrity Monitoring (FIM)

Pro: Will normally provide all the information needed.
Cons: Not real-time, requires a lot of resources.

Most file integrity monitoring tools will scan specifically selected directories for changes. The monitoring is however (in most cases) not carried out in real-time but at scheduled intervals. During a scan, a checksum of the files is compared with the values from the last scan. This way the file integrity monitoring tools can identify everything from creating a file, changing, rename to deletion of files or folders.

Because file integrity monitoring is not running in real-time, it is not the best method to alert you about a ransomware attack. File integrity monitoring can however be very useful when the attack has been contained in order to identify which files need to be recovered.

FIM and AgentX

When it comes to FIM and endpoint security, AgentX’s file integrity monitoring proactively identifies any change in content, permissions, ownership, and attributes of files that is crucial. It also identifies users and applications who created or modified the files. This helps analysts quickly identify integrity changes made to files and directories, get alerts when critical files and systems are tampered with, perform automated investigations, and remediate threats with SOAR.

Windows OS

Pro: Real-time, a native part of the OS.
Cons: Object monitoring is very chatty, difficult to detect renames.

Object access monitoring must be activated either through a Global Policy object or through a local security policy on the server. Furthermore, it is necessary to enable monitoring for everybody on the folders in question. A comprehensive guide on this can be found on Microsoft Technet.

When enabled this will generate a lot of events in the server’s security log. The major event to look for is event ID “4663”. The key in this event to look for is the access mask because this will reveal what kind of object access has been carried out. When the events have been identified, further investigation is needed in order to determine if a 4663 event is a delete or rename, etc.

The search language in Logpoint’s SIEM solution makes it very simple to do this and build a dashboard like the following (remember when dealing with ransomware, it is the number of activities in a directory that will be the counter):

In the latter case, over the last 10 minutes, Bandit has created 2500 files in the c:tmptest directory, which will be considered abnormal. Again, when a baseline has been established for the enterprise, the search from the dashboard can be reused to create near real-time alarms.

Furthermore, with a small change, the search can provide a full list of files that have been changed/deleted, etc. by a specific user. The list can be exported and reused as input for backup software to start a restoration of the affected files. In this way, Logpoint facilitates recovery, which can be started within minutes.

Hardware

Pro: Real-time, a native part of the storage system.
Cons: Enrichment of the logs may be needed.

In a lot of enterprises, users connect directly to the storage environment. In these cases, the audit log has to come directly from the storage devices (Logpoint supports most of the major storage systems).

Audit for malware activities has to be carried out more or less in the same way as with the Windows OS. The storage logs are normally much less chatty than an OS log and more precise on what has happened on the system.

Depending on the type of access to the storage system used, the audit log may not contain everything needed, i.e. the individual event may contain a file name, IP address, and the type of access, but no username. Here, Logpoint’s ability to enrich the log files can be a big help. An IP address can be translated to a device name, and a device name can be converted to a specific user in one query. In this simple way, Logpoint is able to identify a person who is doing something out of the ordinary, so action can be taken at once.

The Human Factor

Even though Logpoint file integrity monitoring tools can help to quickly identify behavior that is out of the ordinary and can be an indicator of ransomware, human intervention is still needed in order to stop and contain the processes as well as start the recovery. Unfortunately, this last part is greatly overlooked, hence the cost and mean time to recover become greater than needed. It is therefore an absolute must to test the procedures needed when Logpoint alerts you of ransomware.

Logpoint customers are already experiencing the great value of this feature and one has more than 50,000 employees and claim the ability to detect and react to any ransomware attack across its massive IT infrastructure in less than 5 minutes.