Detecting Ransomware W Unified Security
Detecting Ransomware W Unified Security
Detecting Ransomware W Unified Security
AlienVault USM
Recent years has seen a marked increase in
encrypting ransomware. Ransomware usually
propagates as a trojan via email with an attachment
or directing users to a malicious website for a drive-
by malware download. Historically ransomware SIEM ASSET
has primarily targeted Windows operating systems DISCOVERY
but Mac OS X variants have also begun to emerge.
Typically, once the malicious file executes it
connects to a Command and Control (C&C) server
AlienVault Labs
where the malware begins to encrypt specific Threat Intelligence
file types on a system as well as shared drives.
The ransomware demands payment to provide a
password to unlock the encrypted files, or else
it will continue to encrypt files until the system is BEHAVIORAL VULNERABILITY
unusable. MONITORING ASSESSMENT
The USM platform has all of the essential security controls built-in, with its capabilities continually enhanced by
AlienVault Labs Threat Intelligence. You can also incorporate log data from virtually any third party security tools via
the extensive plugin library, which allows you to preserve the value of previous investments.
The AlienVault USM platform uses a variety of technologies to gather information on a range of threat vectors to
provide the who, what, where, when and how of these attacks including:
Network Intrusion Detection (IDS) analyzes the network traffic to detect signatures of known attacks and patterns
that indicate malicious activity. Using field-proven IDS technologies, USM identifies attacks, malware, policy
violations and port scans by performing signature, anomaly and protocol analysis.
Host Intrusion Detection (HIDS) and File Integrity Monitoring (FIM) analyze system behavior and configuration
status to identify suspicious activity and potential exposure. This includes the ability to identify the registry change
required to initiate the ransomwares encryption engine.
Correlation Directives The AlienVault Labs Threat Research Team regularly adds ransomware-specific correlation
directives that identify a range of behaviors that are indicative of a ransomware infection, including:
Downloading the ransomware file
Multiple failed connections from a system attempting to connect to a domain (or multiple domains) within a
narrow time window
The AlienVault Labs team uses this diverse source of information to deliver regular threat intelligence updates to the
USM platform. USMs integrated threat intelligence from AlienVault Labs eliminates the need for IT teams to spend
precious time conducting their own research on emerging threats, or on alarms triggered by their security tools. The
AlienVault Labs team regularly delivers threat intelligence as a coordinated set of updates to the USM platform, which
accelerates and simplifies threat detection, prioritization, and response:
Dynamic incident response templates delivers customized guidance on how to respond to each alert
Newly supported data source plug-ins expands your monitoring footprint
2016 AlienVault. All rights reserved. AlienVault and the AlienVault logo are trademarks or registered trademarks of AlienVault. 2
All other names and trademarks are for identification purposes and are the property of their respective owners.
W H I T E PA P E R
USM combines the following essential security capabilities, including SIEM, for single-pane-of-glass security visibility
and management:
Asset Inventory
Software Inventory
Vulnerability Assessment
Continuous Vulnerability Monitoring
2016 AlienVault. All rights reserved. AlienVault and the AlienVault logo are trademarks or registered trademarks of AlienVault. 3
All other names and trademarks are for identification purposes and are the property of their respective owners.
W H I T E PA P E R
Intrusion Detection
Network IDS
Host IDS
Behavioral Monitoring
Netflow Analysis
SIEM
Log Collection
Incident Response
Traditional security point-products require extensive configuration and tuning during deployment, and monitoring
after deployment. The lack of integration with other tools means that even with a centralized management console
like SIEM, IT teams have to dedicate a significant amount of staff time to managing each security control, and even
more time trying to consolidate and correlate all of the alerts being generated by those tools.
By providing built-in essential security capabilities and integrating threat intelligence from AlienVault Labs, the USM
platform significantly reduces complexity and deployment time so that you can go from installation to first insight in
about an hour.
1. AlienVault Sensor: Sensors perform four of the five essential capabilities of AlienVault: Asset Discovery,
Vulnerability Assessment, Threat Detection, and Behavioral Monitoring. Sensor Processes perform initial
processing (normalization) on that raw data, then transmit normalized events to the AlienVault Server for correlation
and reporting.
2. AlienVault Server: The AlienVault Server provides a unified security management and configuration capability for
all monitored assets. The Server receives normalized data from one or more Sensors, correlates and prioritizes
the security events occurring across all assets, then displays these as alarms and security events in a variety of
summary and detailed reports and dashboard views.
3. AlienVault Logger: The AlienVault Logger provides the Server with the ability to archive log files for purposes of
forensic analysis and to fulfill compliance requirements for log archival and management.
2016 AlienVault. All rights reserved. AlienVault and the AlienVault logo are trademarks or registered trademarks of AlienVault. 4
All other names and trademarks are for identification purposes and are the property of their respective owners.
W H I T E PA P E R
AlienVault Labs
USM Sensor
Threat
Intelligence
About AlienVault
AlienVault has simplified the way organizations detect and respond to
todays ever evolving threat landscape. Our unique and award-winning
approach, trusted by thousands of customers, combines the essential security
controls of our all-in-one platform, AlienVault Unified Security Management,
with the power of AlienVaults Open Threat Exchange, the worlds largest
crowdsourced threat intelligence community, making effective and affordable
threat detection attainable for resource-constrained IT teams. AlienVault is a
privately held company headquartered in Silicon Valley and backed by Trident
Capital, Kleiner Perkins Caufield & Byers, Institutional Venture Partners, GGV
Capital, Intel Capital, Jackson Square Ventures, Adara Venture Partners,
Top Tier Capital and Correlation Ventures. For more information visit www.
AlienVault.com or follow us on Twitter (@AlienVault).