<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ransomware Prevention / Detection / Response Resources in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414512#M93137</link>
    <description>&lt;P&gt;Adding to this thread with the incident response firm, CrypSis, and their 2020 incident report found &lt;A href="https://start.paloaltonetworks.com/cybersecurity-threat-report.html" target="_self"&gt;here.&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many great tidbits of information in here, from their largest observed entry vectors, threat actor groups, most targeted services, etc.. Beyond the Palo platform, there's lots of general networking best practice guidelines in the report.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jun 2021 16:12:36 GMT</pubDate>
    <dc:creator>LAYER_8</dc:creator>
    <dc:date>2021-06-22T16:12:36Z</dc:date>
    <item>
      <title>Ransomware Prevention / Detection / Response Resources</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414383#M93113</link>
      <description>&lt;P&gt;There are many articles, guides, and resources available across various Palo Alto Networks properties to guide users on how to best protect their organizations from ransomware. After spending some time to find many of them, I thought I would share with everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;High level from what I could find there were a few high level recommendations from resources like Unit 42:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. Block network-borne ransomware (NGFW + Security subscriptions)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Someone made &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTLCA0" target="_self"&gt;a great write up on the knowledge base&lt;/A&gt; about best practices for general ransomware prevention. Unit42 as well seems to publish research on specific attackers like (&lt;A href="https://unit42.paloaltonetworks.com/darkside-ransomware/" target="_self"&gt;ex: Darkside&lt;/A&gt;) which give more specific guidance. If you read the first link, you'll see there are several action items to take and I've tried to link documentation and best practice pages as best I can for these:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Decrypt traffic where possible for visibility (&lt;A href="https://docs.paloaltonetworks.com/best-practices/10-0/decryption-best-practices/decryption-best-practices/deploy-ssl-decryption-using-best-practices.html" target="_self"&gt;Best Practices&lt;/A&gt;)&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Attackers can move around infra to change source IPs, harder to change tools - often need to see into the body of traffic to detect effectively&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Use &lt;/STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/content/techdocs/en_US/best-practices/10-1/data-center-best-practices/data-center-best-practice-security-policy/how-to-create-data-center-best-practice-security-profiles/create-the-data-center-best-practice-file-blocking-profile.html" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;file blocking profiles&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; to block unneeded, malicious payload types&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;For file types allowed, follow &lt;/STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/wildfire/10-1/wildfire-admin/wildfire-deployment-best-practices/wildfire-best-practices.html" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Wildfire Best Practices&lt;/STRONG&gt;&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Enable &lt;/STRONG&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/threat-prevention/dns-security.html" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;DNS Security&lt;/STRONG&gt;&lt;/A&gt;&lt;STRONG&gt; on firewalls&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;80% of malware uses it in some way -&amp;gt; C2, Exfil&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGECA0" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Sinkhole traffic&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to tag and then reduce access of infected hosts&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Leverage vulnerability protection profiles&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://docs.paloaltonetworks.com/best-practices/10-1/data-center-best-practices/data-center-best-practice-security-policy/how-to-create-data-center-best-practice-security-profiles/create-the-data-center-best-practice-vulnerability-protection-profile.html" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Overall best practices&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm2rCAC" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Specific to Exploit Kits and Phishing&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Attach (at a minimum) to all internet traffic policies&lt;/SPAN&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Optimally E-W as well where possible to prevent lateral spread&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;LI&gt;&lt;SPAN&gt;Leverage &lt;/SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/policy/use-an-external-dynamic-list-in-policy.html" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;EDLs&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to block known bad IPs and domains&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Keep up to date on all content packages &lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2.&amp;nbsp;Prevent Ransomware on endpoint with Cortex XDR&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/endpoint-security/endpoint-security-concepts/endpoint-protection-modules.html" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Cortex Endpoint Protection Modules&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Anti-ransomware&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Local (static) Analysis + Wildfire (dynamic and sandboxing)&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;SPAN&gt;Windows, Mac, and Linux look to be supported by 1 or both of above&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Make sure these modules are enabled&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;3. Leverage SOAR to quickly respond &amp;amp; automate hunting for threats&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SOAR platforms and playbooks are great to document and automate responses. Cortex XSOAR has a lot of OOTB content and playbooks for certain scenarios which can be great references (even if you can't get a SOAR tool in your arsenal today).&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/blog/security-operations/cortex-xsoar-for-automated-ransomware-response/" target="_self"&gt;Ransomware is one of these&lt;/A&gt;. Full documentation &lt;A href="https://xsoar.pan.dev/docs/reference/playbooks/post-intrusion-ransomware-investigation" target="_self"&gt;here&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;4. Contain and recover with experts on hand&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to products, Palo Alto Networks is doing a lot of work in consulting, services, etc these days to be a full partner to customers and not just a tech vendor. Below are some links to a bunch of the services available - one of which is a Ransomware Readiness to look at current state of an org and map a path to be ready to fight off ransomware attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Proactive&lt;/SPAN&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/risk-compliance/cybersecurity-risk-assessment" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Proactive Assessments&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; - "who can help me understand my risk/posture"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/risk-compliance/third-party-risk-assessment" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;3rd Party risk assessments (partners and acquisitions)&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: "How do I know my business partner / potential acquisition has a clean house?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/incident-response/ransomware-investigation" target="_self"&gt;&lt;SPAN&gt;Ransomware Readiness&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: "If I suffer a ransomware attack, how can I make sure it won't impact my operations &amp;amp; I won't be forced to pay?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/proactive-assessments/breach-readiness-review" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Breach Readiness&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: "Do I have my response procedures planned, documented, and ready to go if we suffer a breach so that we can mitigate damage?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/threat-intelligence" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Threat Intel and Briefings&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; "who can keep me up to date on current trends in the threat landscape so I know what to be looking for?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;LI&gt;&lt;SPAN&gt;Reactive&lt;/SPAN&gt;&lt;/LI&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/proactive-assessments/compromise-assessment" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Find out if you have been compromised&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: &lt;/SPAN&gt;&lt;SPAN&gt;"How do I know if recent attack XXXX affects/affected me?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;I&lt;/SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/incident-response/advanced-persistent-threat-investigation" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;nvestigate Advanced Persistent Threats in your environment&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: "&lt;/SPAN&gt;&lt;SPAN&gt;How do I confirm if a sneaky threat actor is or is not already lurking in my business waiting for the right moment?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/cortex/incident-response" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Incident Response Retainers - 'If I get breached who will help me"&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://www.paloaltonetworks.com/unit42/incident-response/business-email-compromise" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;Remediate Business Email Compromise&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;: "How do I quickly respond to&lt;/SPAN&gt;&lt;A href="https://www.fbi.gov/scams-and-safety/common-scams-and-crimes/business-email-compromise" target="_blank" rel="noopener"&gt; this specific type of attac&lt;/A&gt;&lt;SPAN&gt;k?"&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Finally, an excellent general resource (as linked in the comments below) is the &lt;A href="https://www.paloaltonetworks.com/resources/research/2020-unit42-incident-response-and-data-breach-report" target="_self"&gt;Unit42 Incident Response and Data Breach Report&lt;/A&gt;, which goes into great detail about major trends and action plans to mitigate (including but not limited to Ransomware).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:20:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414383#M93113</guid>
      <dc:creator>KPawlak</dc:creator>
      <dc:date>2021-06-22T16:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware Prevention / Detection / Response Resources</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414512#M93137</link>
      <description>&lt;P&gt;Adding to this thread with the incident response firm, CrypSis, and their 2020 incident report found &lt;A href="https://start.paloaltonetworks.com/cybersecurity-threat-report.html" target="_self"&gt;here.&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many great tidbits of information in here, from their largest observed entry vectors, threat actor groups, most targeted services, etc.. Beyond the Palo platform, there's lots of general networking best practice guidelines in the report.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:12:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414512#M93137</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-06-22T16:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware Prevention / Detection / Response Resources</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414519#M93138</link>
      <description>&lt;P&gt;great share&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/160615"&gt;@LAYER_8&lt;/a&gt;&amp;nbsp; - I'm going to edit the original post to include this. thanks&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 16:17:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ransomware-prevention-detection-response-resources/m-p/414519#M93138</guid>
      <dc:creator>KPawlak</dc:creator>
      <dc:date>2021-06-22T16:17:34Z</dc:date>
    </item>
  </channel>
</rss>

