Skip to content

Exabeam Appoints Pete Harteveld as CEO — Read More

Ransomware’s Weakness: How to Turn Ransomware’s Achilles’ Heel Into the Defender’s Golden Hour

  • Mar 22, 2021
  • Gorka Sadowski
  • 4 minutes to read

Table of Contents

    Ransomware has an Achilles’ heel, yet few organizations are paying attention to the canary in the coal mine. Understanding normal versus abnormal behavior sheds light on the presence of ransomware performing reconnaissance before it strikes. This represents a great opportunity for defenders to get an early heads-up. In this post we’ll examine how organizations can leverage this knowledge. 

    Here to stay

    Ransomware is unfortunately here to stay. It took off in 2013 with the CryptoLocker variant, along with cryptocurrency becoming the de facto payment form. Back then, the attacker asked for a payment of $300 to decrypt the files. How things have changed…today no organization is immune to ransomware attacks, not even hospitals. They used to be spared by attackers who would offer them decryption keys for free. However, over the past two months, several small regional hospitals in France have been hit with a ransom of $50K. This latest Acer attack with an unprecedented $50M ransom is raising some eyebrows and will likely perpetuate, and even exacerbate, a bad cycle of more organizations hit with larger ransoms.  

    Strike fast

    As described in Exabeam’s research paper, “Anatomy of a Ransomware Attack”, there is a fundamental difference between typical malware and typical ransomware. Malware wants to be silent, hidden and linger, whereas ransomware wants to strike as fast as possible, with most phases in the attack lasting only minutes. For reference, the phases of a ransomware kill chain are as follows: 

    ransomware kill chain
    Figure 1. Phases of a ransomware kill chain 
    1. Distribution campaign – attackers use techniques like social engineering and weaponized websites to trick or force users to download a dropper which kicks off the infection  
    1. Malicious code infection – the dropper downloads an executable which installs the ransomware itself  
    1. Malicious payload staging – the ransomware sets up, embeds itself in a system, and establishes persistency to exist beyond a reboot  
    1. Scanning – the ransomware searches for content to encrypt, both on the local computer and the network accessible resources  
    1. Encryption – the discovered files are encrypted  
    1. Payday – a ransom note is generated, shown to the victim, and the hacker waits to collect on the ransom  

    There are only a few phases where an organization can disrupt an active ransomware. This is described in the table below. 

    Figure 2. Where and how can ransomware be disrupted 

    With ransomware, time is of the essence and as stated in the table above, it’s clear that not all stages of attack can be disrupted. 

    Detecting ransomware 

    Detecting the ransomware during the early phases of the attack such as “Infection” and “Staging” would require an indicator of compromise (IOC), however those IOCs usually only exist after attacks have been effective and reported back to security vendors at least once. Worse, the most effective ransomware attacks use zero-day or freshly released vulnerabilities – e.g., seven days between the publication of the Microsoft Exchange HAFNIUM vulnerability and the weaponization of that vulnerability for a new attack campaign. 

    The “Encrypt” phase is also interesting for the defender. Endpoint security vendors can efficiently disrupt the ransomware at this stage, but only for known ransomware strains for which the EDR/AV vendors have developed deterministic signatures. For new ransomware, EDR/AV vendors usually err on the side of caution. Disrupting zero-day ransomware would typically require endpoint security vendors to also disrupt regular users from normal endpoint operations, such as preventing any suspicious process to open, save and/or delete any file. 

    From our research, the defender’s Golden Hour is when the ransomware is out in the open, during a spread on the network at the “Scan” phase. At that time it’s scanning the network for files and locations to encrypt, verifying the endpoint’s capabilities to encrypt the files and to delete the cleartext versions of these files, as well as checking for the endpoint’s ability to communicate to a command-and-control center. This behavior is primed to be detected with user and entity behavior analytics (UEBA) tools that use advanced analytics’ behavioral modeling, that can understand what is normal versus abnormal, and that can surface relevant insights in a user-intuitive way. This behavior cannot be detected using simple correlation rules because it  

    1) would require too many rules, and  

    2) it would generate too many false positives. 

    Conclusion 

    Ransomware is here to stay, and organizations large and small need to revisit their risk management priorities for this attack vector. The defender’s window of opportunity is small and requires advanced analytics to try and detect the expected new ransomware and its variants. This can be done by analyzing the behavior of the ransomware executable and the way it interacts with the host and the network. So while it’s almost impossible to write effective correlation rules for unknown behaviors, it’s exactly where UEBA does its trick by detecting the behavioral deviation and thus spotting malicious activity without the need for signatures. 

    For more information, please refer to “The Anatomy of a Ransomware Attack” and refer to the cheat sheet below to ensure you are collecting the proper logs. 

    Gorka Sadowski

    Gorka Sadowski

    Chief Strategy Officer | Exabeam | Gorka Sadowski is Chief Strategy Officer at Exabeam. In his role, Gorka assists the executive team and functional leaders across the company with developing, communicating, executing, and sustaining corporate strategic initiatives. Gorka has more than 30 years of security experience spanning leadership roles across product management, sales, marketing, and operations. Most recently, he was senior director and security and risk management analyst at Gartner driving coverage for security information and event management (SIEM), security operation center (SOC), and managed detection and response (MDR), while also leading research for IT leaders on emerging topics. Prior to Gartner, he led business development at Splunk where he established and built the Splunk security ecosystem. Prior to Splunk, he established presence for LogLogic in Southern Europe, ran security activities for Unisys in France and launched the first partner-led intrusion detection and prevention system (IDPS) in the industry as lead for NetScreen’s Emerging Technology efforts. A certified CISSP, he received a computer science degree from Universite de Pau in France before moving to the U.S. as a Ph.D. candidate in network security at the University of Miami.

    More posts by Gorka Sadowski

    Learn More About Exabeam

    Learn about the Exabeam platform and expand your knowledge of information security with our collection of white papers, podcasts, webinars, and more.

    • Webinar

      Modern SOC Essentials Series 2

    • Webinar

      The Evolving Threat Landscape (Session 1)

    • Blog

      The Cost of Compromise Begins Inside the SOC

    • White Paper

      Breaking the Rules: When Static Detection Logic Reaches Its Limits, What’s Next?

    • Blog

      What’s New in LogRhythm SIEM October 2025

    • Blog

      What’s New with New-Scale in October 2025: Measurable, Automated, Everywhere Security Operations

    • Show More