ChannelLife NZ - Fortinet and Ransomware: What your clients need to know

Warning: This story was published more than a year ago.
Ransomware_laptop.jpg

Fortinet and Ransomware: What your clients need to know

CryptoWall, Locky, TeslaCrypt. To make sense of today’s tech headlines, you have to learn an entire new vocabulary. But one word sums them all up: Ransomware.

Ransomware is running rampant. Fortinet’s FortiGuard Labs monitors worldwide Ransomware infections and has seen a huge jump in incidences over the past six months. For instance, in Hong Kong, there were 46,172 detected Ransomware incidents in September 2015. In October, that number jumped to 1,008,539. Ransomware has gone from being a nuisance for a few enterprises to a worldwide pandemic and there is no respite in sight.

The bad news

The bad news is that, once your clients get stung, the available antidotes all have significant downsides. But the real bad news is that Ransomware is no different than any other malware and that most organisations should be preventing Ransomware as part and parcel of their cyber-security profile. With few exceptions, Ransomware sneaks in via holes in defence. Close the holes and the odds of getting hit go down significantly.

“We are fielding more and more calls from resellers who talk about their customers being infected with Ransomware,” says Andrew Khan, senior business manager at Ingram Micro, New Zealand’s largest distributor of Fortinet’s cyber-security solutions. “Invariably the victims, for one reason or another, hadn’t kept their defences up-to-date and, as a result, they got hit. It’s interesting to note that most malware sneaks in and does its dirty work more or less undetected. The only noticeable evidence might be a slower network. But Ransomware, on the other hand, tells the victim immediately ‘you’ve been hit, now pay up!’”

Staying safe in an unsafe world

Preventing Ransomware takes the same vigilance as preventing any malware. “A Fortigate Next Generation Firewall with internal segmentation, FortiAnalyzer to monitor traffic, FortiSandbox to isolate any detected threats, a FortiGuard Labs subscription service and a well-thought-out and enforced security policy should be enough to keep most Ransomware at bay,” says Khan. “And, with this configuration, even if a mail server or smartphone gets infected, the internal segmentation bulwarks limit the damage.”

Indeed, this is one of the issues that made the ‘Panama Papers’ leak so bad. Once the intruder got inside the corporate network via a compromised server, there were no internal barriers to halt the spread. That, plus the 2TBs of data downloaded with nobody noticing, changed a corporate inconvenience into an international public relations disaster that has seen a Prime Minister resign and offshore tax laws (including our own) undergoing unprecedented scrutiny. “If the law firm in question had made even a modest effort to protect their sensitive data,” notes Khan, “they could have avoided a lot of grief.”

Don’t get hit

So the best bet is not to get stung in the first place. And ensure that your clients are rigorous in their back-up procedures. But what happens if they do get infected? What is the best strategy to clean up the mess?

“They have two options, neither particularly palatable,” says Khan. “Pay up or rebuild their system. But there is no guarantee that paying will end the drama. There might be a hidden payload that will ask for more money (or bitcoin) next month. If your client has been diligent in their backups, then they can simply do a barebone restore and rebuild the new network. But what if there is a hidden payload in the backup files? Before they rebuild, it might pay to get a forensic expert in to find the culprit and delete it before it causes further damage. Either way, it’s not a pleasant exercise.”

What to tell your customers

So what should you be telling your clients about Ransomware? “Firewalls external and internal, real-time network activity monitoring, sandboxing and constant updates,” says Khan. “That, plus user training to keep people from opening dodgy emails or visiting non-essential websites, should keep your clients safe. If you look at the costs of prevention vs the cost of paying a ransom or rebuilding, the numbers make prevention a bargain.”

Fortinet’s recommendation is to have multi-layered defence at endpoints and gateway layers and sandboxing to block and analyse these malware/botnets from entering the network. Fortinet’s advanced threat protection (ATP) helps combat application botnets and adds more control over the network. Rigorous backup is essential.

Fortinet has been putting in a lot of work tracking Ransomware and the effects. Ingram Micro will be happy to talk to you about ‘Ransomware-proofing’ your client’s networks. It’s a conversation you should be having with all of your clients. Start the process now. Before it is too late.

For further information, please contact:

Hugo Hutchinson, business development manager at Ingram Micro
Email: hugo.hutchinson@ingrammicro.com
P: 09-414-0261 | M: 021-245-8276

Marc Brunzel, business development manager at Ingram Micro
Email: marc.brunzel@ingrammicro.com
M: 021 241 6946

Andrew Khan, senior business manager at Ingram Micro
Email: andrew.khan@ingrammicro.com
M: 021 819 793

Interested in this topic?
We can put you in touch with an expert.

Follow Us

Featured

next-story-thumb Scroll down to read: