Preventing Ransomware with Intelligence

2021年6月11日

著者 Lauren Farrell

Recently several high-profile ransomware incidents have affected the country, these include Colonial Pipeline, JBS, and FujiFilm. These attacks do not occur in a vacuum and use known Indicators of Compromise (IOCs) previously published in Cyber Threat Intelligence (CTI). Centripetal’s massive library of CTI contained these indicators for months before the ransomware attacks occurred and can be actively prevented.

Previously Known Indicators

Analyzing the IOCs from the Colonial Pipeline attack shows that the indicators for Darkside ransomware were known since early January of 2021 across 53 separate CleanINTERNET intelligence feeds before the attack was launched. Similarly, the JBS and FujiFilm attacks from the REvil/Sodinokibi ransomware had IOCs published in CTI since January 13th, 2021 across 65 CleanINTERNET intelligence feeds. The intelligence was published by providers including Recorded Future, Proofpoint Emerging Threats, IBM X-Force, ZETAlytics, and more. The intelligence was known beforehand and malicious actors can be stopped in their tracks.

Proactive Defense with Applied Intelligence

Centripetal actively defends networks by utilizing CTI in a proactive manner. CleanINTERNET uses a custom-built Threat Intelligence Gateway to automatically block malicious indicators as they are published in CTI.

迫り来る脅威を知る。 次の脅威を止める。

サインアップして更新情報を受信し、Centripetal がサイバー防御をどのように定義しているかを確認してください。

あなたの組織にふさわしいサイバー犯罪の防壁

当社のセキュリティ チームによるカスタム デモンストレーションにご登録ください。当社が優秀な人材と最も完全な脅威インテリジェンスのコレクションを結集して、驚くべきレベルの安心感を提供する方法を説明します。