ランサムウェア攻撃の中断と追跡

Northern offers a valuable layer in your Ransomware protection strategy.

概要

Northernは、ランサムウェア攻撃の保護に関して重要な機能を提供しています。Northernソフトウェアソリューション(NSS)の機能では、ランサムウェアに関連付けられた拡張子のファイル作成をブロックすることで攻撃が中断され、これらの保存がブロックされたときにメール通知が送信されます。さらに、過去にあった攻撃に関する情報をダッシュボードに表示できます。

このソリューションは、ランサムウェア攻撃との戦いにおいて強力な保護層を提供します。他のツールやアプローチと組み合わせることで、企業はこのようなサイバー攻撃に対するより堅牢で抵抗力のある防御を確立できます。

このユースケースの詳細(解決方法、その効果、実施方法など)については下記に説明いたします。ご興味を持った方はぜひお読みになってください。

Northern Solution

Northern’s software is capable of blocking the saving of specific file types (file extensions), logging and alerting when these policies are triggered, and providing information about these activities in management dashboards.

The configuration of the software is straightforward, and is performed using pre-configured packages and Northern’s PowerShell Toolkit. After configuration, the list of file extensions to be blocked must be maintained by the customer; a regular process of reviewing and updating the list of blocked extensions should be implemented to keep pace with the changing threat. The list of blocked extensions is best maintained by creating simple extension lists and utilizing functions of the PowerShell Toolkit to import them.

Once implemented, the solution will:

  • Continuously monitor for, and block, attempted saves of prohibited file types.
  • Send alerts to the threat response team with information about the attempted attack (file extension blocked, account used, etc.).
  • Provide regularly updated dashboards that allow for patterns to be identified, and show the effectiveness of the work being done.

Blocking Attempted Attacks

For the target platforms that offer the necessary interface (see Requirements below) NSS can be configured to block the creation of files according to their extension – File Block policies. This capability is being used to prevent Ransomware from encrypting and saving files with a new file extension; the Ransomware is paralysed as its attempts to save encrypted versions of your users’ data are denied.

By implementing a regular process of updating NSS’ configuration, through the user interface or the Northern PowerShell Toolkit, customers are able to continuously maintain policies as the Ransomware threat changes – adding new file extensions to block new Ransomware types. Ransomware that uses a random extension, retains a file’s original extension, or uses an extension that is not currently configured to be blocked, will not be detected.

Alert When Attacks are Blocked

Normally, the software is configured to send an email to the the threat response team within two minutes of the File Block policies being triggered. (This interval can be shortened or lengthened.) These alerts provide information to guide their response, such as the account(s) that were used to attempt these writes, the number of attempted writes, and the file extensions that were blocked.

NSS leverages the audit trail that it maintains about File Block activity to populate these alerts. One controlling factor in the content of this log, and therefore the content of alerts, is the information that the target platform is able to deliver. Northern’s Professional Services team will be able guide you in determining what information can be included in your alerts.

Example of a simple email notification delivered by this solution:

Management Dashboards

It is important to be able to both block attacks, and gather data about the attacks that have been blocked. This information is vital if patterns are to be found, so that long-lasting solutions can be implemented, and it enables the security team to monitor the effectiveness of the processes put in place and report that effectiveness to relevant stakeholders.

Northern’s self-service, and fully role-based-access compliant interface can be configured to display both overview and detailed information about activities of the File Block policies put in place. This configuration is achieved, very simply, by importing pre-configured settings.

Summary information in a default dashboard:
Detailed information in a default dashboard:
The table below shows the tasks involved in implementing this Northern solution, the time required, and who is responsible to perform each task*:
ActionTimeOwner
1Import configuration settings and describe workflows2 hoursNorthern
2Edit/confirm Northern’s default list of extensions to block1 hourCustomer
3Run PowerShell Toolkit commands0.5 hoursNorthern
4Maintain list of extensions to block as threats develop1 hour per reviewCustomer
* The exact list of tasks involved, and the time required for each, will depend on a customer’s specific circumstances. Contact Northern’s Professional Services team for information about what woould be necessary in your organization.

Ransomware protection can only be achieved by establishing multiple layers of security, process, and awareness. Northern offers one of these layers – a software solution that interrupts, alerts on, and tracks attempted attacks over time. 

If you are already a Northern customer, and you are using the software for both quota functionality and file system analysis, then there is no need to prepare new application infrastructure or prepare new application IDs.

There are no requirements to change the current IT infrastructure. You should not need to seek advanced approval, or complete a detailed Change Control process. This is a straightforward, no-nonsense way to improve Ransomware protection for your organization.

RequirementDetails
NSS DeployedVersion 9.91 or later
SQL DatabaseSQL Server 2012 or later
NSS Solution Area(s)Centralized File Service Management (CFSM)
Supported PlatformsNetApp CDOT, NetApp 7-Mode, NetApp Cloud Volumes ONTAP, Dell EMC PowerStore/Unity/VNX, and Hitachi Vantara HNAS

More of what we deliver

リスク軽減

情報漏洩、サイバー攻撃、データプライバシー保護規制―あなたの組織のデータには必ず機密情報が含まれています。

コスト削減

組織のデータの保管には見えにくい費用も考慮すると相当コストがかかります

効率向上

データが混とんとしているとデータの所有者や使用者の効率も下がります

企業責任・CSR

社内外に関わらずITサービスにはCSRの促進機能を組み込む必要があります

Northern Parklife icon

Get started

If you wish to start using NSS to interrupt and track Ransomware attacks please contact your Account Manager, or the Professional Services team, to schedule the first action: import configuration settings and describe workflows.

Contact Us