WastedLocker and EndPoint Detect + Response

2 years ago

Cyber attacks are continually sophisticating and evolving ways to circumvent traditional anti-virus. Most recently, technology company Garmin fell victim to a new type of attack, WastedLocker. Attackers set out to steal your valuable business data and to generally cause chaos which can result in lengthy downtime. However, this can generally be avoided if a sophisticated IT security approach and services such as Endpoint Detection and Response (EDR) is adopted. 

What is WastedLocker? 

WasterLocker is a new type of ransomware created by Evil Corp Group (also known as the Dridex Gang). Ransomware is a form of malware that encrypts your files, data, and in some cases, even your backups. As suggested by the name, ransomware holds your encrypted data at ransom. Attackers will typically ask for a payment via Bitcoin or another cryptocurrency, however, there is no guarantee that your data will be released if you pay the ransom. In some cases your data will also be auctioned off to buyers on the dark web. 

The name of this particular ransomware, WastedLocker, is based on the file extension the virus adds to encrypted files. Usually files encrypted by WastedLocker will include the victimโ€™s name and then โ€œwastedโ€. Fox IT found the virus โ€œhit file servers, database services, virtual machines, and cloud environmentsโ€. They also found that WastedLocker makes a deliberate attempt to disrupt backup applications to increase downtime. By deleting and disrupting backups, Evil Corp attempt to incentivise victims to pay the ransom.  

EDR versus Traditional Anti-Virus 

Traditional Anti-Virus works on a reactionary approach and is therefore no longer enough to properly deal with these types of attacks. Similarly, because these attacks are continually evolving, they have mostly found ways to breach traditional anti-virus software. Traditional anti-virus typically investigates based on a set of rules, known threats, patterns and characteristics to detect threats. Essentially, traditional anti-virus is a reactive tool, however, what is needed is a proactive tool. 

SolarWindsโ€™s SentinelOne is an example of next generation anti-virus. SentinelOne includes both endpoint protection (EPP) and endpoint detection and response (EDR). As well as this, SentinelOne also includes Active EDR which uses deep visibility and threat hunting. This means not only does SentinelOne wait for threats, but it also actively hunts for threats to detect. You can read more about threat hunting here. 

SentinelOne in Action 

Recently, SentinelOne detected suspicious activity on an endpoint device of a Milnsbridge customer. In this particular instance it only took a few milliseconds to install thousands of malicious files however, SentinelOne detected this in real time and was able to stop and quarantine the attack before it spread. Without SentinelOne it may have taken days to track and completely clean the affected files. However, SentinelOne provide a story board and transcript of exactly how the attack took place and which files were corrupted on their easy-to-use dashboard interface. Read more about SentinelOne here.

WastedLocker is another example of the highly aggressive ransomware attacks that are constantly being weaponised against small/medium businesses and enterprises. SentinelOne is just one part of Milnsbridgeโ€™s robust secure operating environment (SOE) designed to minimise downtime and keep customerโ€™s data safe.  

To find out more about SentinelOne or Managed Security call Milnsbridge IT on 1300 300 293.ย 

Letโ€™s get started

Get in touch today and speak with one of our friendly staff. We will take the time to assess your business requirements and provide an obligation-free quote.ย 

Facebook
Twitter
LinkedIn

CORE

All the essentials
$ 69 Monthly
  • 3 Hours Remote Support
  • Support Hours 8am - 5.30pm M-F
  • Best Effort Response Times
  • Staff Onboarding + Offboarding
  • Microsoft 365 Administration
  • Cyber Security Awareness Training
  • EDR/Antivirus - Endpoint Protection
  • Cloud Hosted Email Security
  • Critical Software + Security Updates
  • Server Performance Monitoring
  • 24 x 7 System Monitoring + Alerts
  • Daily Backup Monitoring
  • Monthly Executive Reports
  • Standard Operating Environment

Growth

Unlimited Support + Security
$ 89 Monthly
  • Unlimited Remote + Onsite Support
  • Support Hours 8am - 5.30pm M-F
  • Guaranteed Response Times
  • Staff Onboarding + Offboarding
  • Microsoft 365 Administration
  • Cyber Security Awareness Training
  • EDR/Antivirus - Endpoint Protection
  • Cloud Hosted Email Security
  • Critical Software + Security Updates
  • Server Performance Monitoring
  • 24 x 7 System Monitoring + Alerts
  • Daily Backup Monitoring
  • Monthly Executive Reports
  • Standard Operating Environment
  • Keeper Password Manager
  • Duo Multi Factor Authentication
  • DNS Filter Internet Protection
Popular

Enhanced

Unlimited Support 24x7 + Security
$ 159 Monthly
  • Unlimited Remote + Onsite Support
  • 24 Hours Support - 7 Days a Week
  • Priority Response Times
  • Staff Onboarding + Offboarding
  • Microsoft 365 Administration
  • Cyber Security Awareness Training
  • EDR/Antivirus - Endpoint Protection
  • Cloud Hosted Email Security
  • Critical Software + Security Updates
  • Server Performance Monitoring
  • 24 x 7 System Monitoring + Alerts
  • Daily Backup Monitoring
  • Monthly Executive Reports
  • Standard Operating Environment
  • Essential 8 Assess & Report
  • Monthly Vulnerability Scanning
  • Threatlocker Application Control
  • Keeper Password Manager
  • Duo Multi Factor Authentication
  • DNS Filter Internet Protection