Egregor ransomware attacks are known for their heinous but extremely successful double extortion methods.
The cybercrime gang compromises sensitive data, encrypting it to prevent the victim from accessing it. They then post a portion of the hacked data on the dark web to demonstrate that the exfiltration was effective. The victim is then urged in a ransom letter to pay a predetermined amount within three days to avoid further personal data from being broadcast on the criminal network. The confiscated data is fully decrypted if the ransom is paid before the ultimatum expires.
Since its debut in September 2020, ransomware has been utilised against businesses in a variety of sectors and is expected to continue to pose a danger to enterprises in the future.
Tips to Avoid Egregor Ransomware
To minimise the danger of exposure, the following best practices are recommended:
- Implement a patch management programme and keep all software and device firmware up to date to reduce the attack surface for zero-day vulnerabilities.
- On a periodic basis, deploy the security measures and signatures recommended by your organization’s security OEM.
- Back up systems on a regular basis and store backups in a safe, segregated place.
- Protect remote access by using strong passwords, limiting remote access permissions to just the required people, disabling remote access when not in use, and using two-factor authentication for remote sessions.
- Ensure that workers and network users are informed on phishing’s risks.
- Assign unique user credentials to each Admin user. Additionally, user accounts should be granted just the rights necessary to perform job functions.
- Enable heuristics (behavioural analysis) in anti-malware programmes to monitor for suspicious behaviour and keep anti-malware software updated.
- Monitor network traffic for unusual connections and maintain logs of system and network activities.
- Wherever feasible, use network segmentation to restrict the propagation of malicious software and to limit an attacker’s foothold.