• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Endpoint Security • Ransomware • Threat Advisories & Alerts  /  Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack
Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack
25 April 2018

Ransomware Alert! Follow these steps to secure your system against an ongoing ransomware attack

Written by Rajib Singha
Rajib Singha
Endpoint Security, Ransomware, Threat Advisories & Alerts
11
Shares

Quick Heal has detected an ongoing ransomware attack. This post outlines the important steps you must take to protect your computer(s) against this threat.

What to do to stay safe from the attack?

Most of the steps mentioned below are technical in nature. If you need any assistance, please call us on 1800 212 7377.

  1. Ensure all protection levels in your Seqrite product are ON.
  2. Disable Remote Desktop Protocol (RDP) if not used. Instructions on how to do this have been mentioned at the end of this post.
  3. Change RDP port to a non-standard port. Click here to know how to do this
  4. Configure your Firewall in the following ways:
    • Deny access to Public IPs to important ports (in this case RDP port 3389)
    • Allow access to only IPs which are under your control
  5. Use a VPN to access a network, instead of exposing RDP to the Internet.
  6. If possible, implement Two Factor Authentication (2FA).
  7. Set a lockout policy which hinders guessing of credentials.
  8. Create a separate network folder for each user when managing access to shared network folders.
  9. Don’t keep shared software in an executable form.
  10. Don’t assign administrator privileges to users. Most importantly, don’t stay logged in as an administrator unless it is strictly necessary. Also, avoid browsing, opening documents or other regular work activities while logged in as an administrator.

About the ransomware attack
Quick Heal has detected a recent ransomware outbreak which uses a Remote Desktop Protocol (RDP) brute force attack. However, we suspect that this attack could also be using other means to spread. These could be:

  1. Spam and phishing emails
  2. Exploit Kits
  3. SMB vulnerabilities like (EternalBlue, etc.)
  4. Drive-by-downloads
  5. Dropped by other malware

What is Remote Desktop Protocol (RDP)?
The Remote Desktop protocol is used to connect to another computer over a network remotely. It’s generally used to carry out remote device management. The protocol runs over TCP/UDP port 3389.

What is a Brute Force Attack?
A brute force attack is a trial-and-error method used to retrieve critical information such as usernames, passwords or any kind of personally identifiable information (PII). A brute force attack is generally carried out through automated scripts.

By brute forcing the user credentials to access the RDP on a victim’s machine, attackers are able to uncover usernames and passwords. Once the user credentials are obtained, attackers control the victim’s machine to carry out the intended attack. In most cases, ransomware attacks have been observed as the end result of a Remote Desktop Protocol brute force attack.

About the detected ransomware that is spreading through the RDP brute force attack
Quick Heal has observed the Dharma ransomware outbreak to have used the RDP brute force attack. Earlier, other ransomware were also observed to have spread through the same mechanism. In this particular scenario, the attacker can take control of the system with administrative privileges. This allows them to install/uninstall any program on the infected computer. Here, we have observed that attackers were uninstalling the security software from the infected machine. And by doing so, they were able to implant a ransomware on it.

How Seqrite protects its users from such attacks

Seqrite products are built with the following multi-layered security layers that help counter such attacks.

  1. Anti-Ransomware
    Specially designed to counter ransomware attacks. This feature detects ransomware by tracking its execution sequence.
  2. Firewall
    Blocks malicious attempts to breach network connections.
  3. IDS/IPS
    Detects RDP brute force attempts and blocks the remote attacker IP for a defined period.
  4. Virus Protection
    Online virus protection service detects the known variants of the ransomware.
  5. Behavior-based Detection System
    Tracks the activity of executable files and blocks malicious files.
  6. Back Up and Restore
    Helps you take regular backups of your data and restore it whenever needed.

Important safety measures to keep your computer safe against ransomware attacks

It is important to understand that such kinds of attacks are targeted towards victims with weaker security infrastructure. This makes it highly critical for individual users and businesses to strengthen their security perimeter and stand strong against all such attacks.

1. Back up data regularly

  • Back up your important data regularly and keep a recent backup copy offline. Encrypt your backup. If your computer gets infected with a ransomware, your files can be restored from the offline backup once the malware has been removed.
  • Always use a combination of online and offline backup.
  • Do not keep offline backups connected to your system as this data could be encrypted when a ransomware strikes.

2. Keep OS and all other software up-to-date

  • Always keep your security software up-to-date.
  • Keep your Operating System and other software updated. Software updates frequently include patches for newly discovered security vulnerabilities which could be exploited by attackers.
  • Apply patches and updates for software like Microsoft Office, Java, Adobe Reader, Flash, and all Internet browsers like Internet Explorer, Chrome, Firefox, Opera, etc., including browser plugins

3. Do not download unverified, cracked/pirated software as they can be used to install malware on your computer.

4. Avoid downloading software from untrusted P2P or torrent sites. In most cases, they are malicious.

5. Stay away from phishing attacks

  • Do not click on links or download attachments in unexpected, unknown or unwanted emails. Most phishing emails carry a sense of urgency. They are crafted to trick you into taking an action like clicking on a link or downloading an attached file.
  • Ensure your antivirus is built with an anti-phishing feature that automatically blocks phishing emails and websites.

 How to disable RDP?

  1. In Control Panel, click System And Security, and then click System.
  2. On the System page, click Remote Settings in the left pane. This opens the System Properties dialog box to the Remote tab.
  3. To disable Remote Desktop, select Don’t Allow Connections To This Computer, and then click OK. Skip the remaining steps.

 

This story is developing. We will update this post when we get to learn more about the development.

 

Further reading:
https://blogs.quickheal.com/is-your-remote-desktop-system-safe-from-bruteforce-attacks/
https://blogs.quickheal.com/troldesh-ransomware-brute-forcing-its-way-into-systems/
https://blogs.quickheal.com/dharma-ransomware-resurfaces-new-variant/

 Previous PostWhat is ‘fileless malware’ and why it could be the biggest th...
Next Post  Here’s the checklist of an efficient endpoint security solution
Rajib Singha

About Rajib Singha

Rajib is an IT security news junkie and a computer security blogger at Quick Heal. He is passionate about promoting cybersecurity awareness, content and digital...

Articles by Rajib Singha »

Related Posts

  • How Seqrite Endpoint Protection Blocks Non-Human Threats like Bots, Scripts, and Malware

    June 9, 2025
  • Trapped by a Call: The Digital Arrest Scam

    June 5, 2025
  • Ransomware Attack Over Publicly Shared SMB2 Connections and Staying Protected with Seqrite

    March 11, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (21) BYOD (11) Cyber-attack (36) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (326) cyber security (34) Cyber threat (33) cyber threats (48) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (13) data protection (28) data security (15) DLP (49) Encryption (16) endpoint security (108) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (26) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (14) security (12) Seqrite (35) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (17) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies