Blackmail software solutions
Let blackmail software attack
Known vulnerabilities still is the invasion of extortion software exploiting vulnerabilities most often.Once the inside scoring, the attacker will according to the Active Directory (AD) send attack weak link, thus elevated privileges and spread throughout the organization code.Tenable provides a risk-based view contains all the loopholes and AD wrong configuration, you can blackmail software in its attack path will be blocked.
Read e-books: modern blackmail software attack![勒索软件解决方案 Blackmail software solutions](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/malware-hero.png)
Blackmail software will be bad network security mechanism as a cash machine
Whether it's a bad day or a bad year, the difference between the two is to have a good network security mechanism.Whether using RDP known vulnerabilities or VPN vulnerability, or privilege AD account for improper restrictions, extortion tactics have no secret of the software.Network security teams need to strengthen the basic safety measures to prevent attacks.
Take the risk-based approach to eliminate blackmail software attack path
To defense blackmail software, you must be settled before the attack using defect initiative.Therefore, insight into all the loopholes and error in the attack surface configuration is very important, such ability based on threat intelligence prediction is the most important problem, and move quickly to solve the network risk.Tenable in defect to affect business can help you, even in the headlines before they can find and splashed to repair them.
The hole based on risk management to eliminate invasion
Blackmail software attack will be using the known software vulnerabilities, including a recent for remote access infrastructure (CVE - 2019-19781, the CVE - 2019-11510), Microsoft Windows error (CVE - 2017-0143, CVE - 2018-8453, CVE - 2020-1472) and the Active Directory (CVE - 2020-1472).Continue to master all of the assets and visibility is very important, the vulnerability of the exposure problems so that we can know which place.Using 20 trillion threats, vulnerabilities, and asset data point to predict what threat maker will actively use the loopholes, let you can focus on the most important thing.
![](http://www.yyueer.com/zh-cn/themes/custom/tenable/img/solutions/ransomware/Which-Protective-Measures-Will-Help-You-Really-Disrupt-Ransomware-Attacks.jpg)
![采用基于风险的漏洞管理消除入侵点 The hole based on risk management to eliminate invasion](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/Eliminate-Entry-Points-with-Risk-based-VM.jpg)
Use AD security features to eliminate attack path
Once into the network, software to blackmail the attacker will to look for opportunities to use AD weak link, so as to elevate privileges and lateral movement in the entire enterprise.Only a few companies will limit or management right use of privilege AD account, make enterprise open the door to the spread of malicious software.By reducing the privilege AD group membership, enforcing multiple authentication and monitor AD abnormal activities, to find and fix before the attack AD weak links.
![使用 AD 安全功能消除攻击路径 Use AD security features to eliminate attack path](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/Disrupt-Attack-Paths-with-AD-Security.jpg)
Effectiveness and process maturity improvement plan as a whole
If blackmail software attack successful, may increase the cost of enterprise, enterprise revenue loss, paralysis caused by enterprises.To reduce influence the possibility of business, you must understand your plan in identifying and solving the effectiveness of the defects associated with malware attacks.The use of key indicators to measure and communicate your operation on the effectiveness of the control mechanism in terms of reducing risk, and use the benchmark data inside and outside the industry performance comparisons.
![](http://www.yyueer.com/zh-cn/themes/custom/tenable/img/solutions/ransomware/Improve-Overall-Program-Effectiveness-and-Process-Maturit.png)
![改善计划整体有效性和流程成熟度 Effectiveness and process maturity improvement plan as a whole](http://www.yyueer.com/zh-cn/sites/drupal.dmz.tenablesecurity.com/files/images/pages/Improve-Overall-Program-Effectiveness-and-Process-Maturity.jpg)
Main business benefits
To prevent attack successful
Avoid costly unplanned downtime, data loss, and pay a ransom.
Focus on the most important defects
Solve the blackmail software after obtaining the initial stop the most preferred use of loopholes, and for elevated privileges and deploy malicious code important Active Directory configuration errors.
Strategic action
Using a non-technical business leaders can understand index calculation and convey blackmail software overall response to the situation.
Related products
Refer to the Tenable
The actual application case
"We further study of the various solutions.Of course is Tenable."Matt Ramberg Sanmina, vice President of information security department