Amid a BlackByte ransomware attack against the San Francisco 49ers, MSSPs should remain on high alert for associated ransomware-as-a-service activities that may target end-customers.
According to a joint FBI-Secret Service alert, MSSs can decrease the threat of a BlackByte ransomware attack by taking the following 12 steps for customers:
1. Implement regular backups of all data to be stored as air gapped, password protected copies offline. Ensure these copies are not accessible for modification or deletion from any system where the original data resides.
2. Implement network segmentation, such that all machines on your network are not accessible from every other machine.
3. Install and regularly update antivirus software on all hosts, and enable real time detection.
4. Install updates/patch operating systems, software, and firmware as soon as updates/patches are released.
5. Review domain controllers, servers, workstations, and active directories for new or unrecognized user accounts.
6. Audit user accounts with administrative privileges and configure access controls with least privilege in mind. Do not give all users administrative privileges.
7. Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs for any unusual activity.
8. Consider adding an email banner to emails received from outside your organization.
9. Disable hyperlinks in received emails.
10. Use double authentication when logging into accounts or services.
11. Ensure routine auditing is conducted for all accounts.
12. Ensure all the identified IOCs are input into the network SIEM for continuous monitoring and alerts.