{"id":7116,"date":"2023-12-07T16:12:20","date_gmt":"2023-12-07T15:12:20","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=7116"},"modified":"2023-12-08T10:30:54","modified_gmt":"2023-12-08T10:30:54","slug":"remote-ransomware-protection-a-huge-sophos-endpoint-differentiator","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/es-es\/2023\/12\/products\/remote-ransomware-protection-a-huge-sophos-endpoint-differentiator\/","title":{"rendered":"Sophos Endpoint: Industry-leading Protection Against Remote Ransomware Attacks"},"content":{"rendered":"<p>Around 60% of human-operated ransomware attacks\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noopener\">now involve malicious remote encryption<\/a>. Read on to learn about this prevalent ransomware attack vector and Sophos\u2019 industry-leading protection capabilities.<\/p>\n<h2>What is remote ransomware?<\/h2>\n<p><strong>Remote ransomware, also known as malicious remote encryption, is when a compromised endpoint is used to encrypt data on other devices on the same network.<\/strong><\/p>\n<p>In human-led attacks, adversaries typically try to deploy ransomware directly to the machines they want to encrypt. If their initial attempt is blocked (for example, by security technologies on the target devices) they rarely give up, choosing instead to pivot to an alternative approach and try again, and again.<\/p>\n<p>Once attackers succeed in compromising a machine they can leverage the organization\u2019s domain architecture to encrypt data on managed domain-joined machines. All the malicious activity \u2013 ingress, payload execution, and encryption \u2013 occurs on the already-compromised machine, therefore bypassing modern security stacks. The only indication of compromise is the transmission of documents to and from other machines.<\/p>\n<p>Eighty percent of remote encryption compromises\u00a0<a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2023\/10\/05\/microsoft-digital-defense-report-2023-global-cyberattacks\/\" target=\"_blank\" rel=\"noopener\">originate from unmanaged devices on the network<\/a>, although some start on under protected machines that lack the defenses needed to stop attackers getting onto the device.<\/p>\n<h2>Why is remote ransomware so prevalent?<\/h2>\n<p>A key factor driving the widespread use of this approach is its scalability: A single unmanaged or under-protected endpoint can expose an organization\u2019s entire estate to malicious remote encryption, even if all the other devices are running a next-gen endpoint security solution.<\/p>\n<p>To make matters worse, adversaries are not limited in their choice of ransomware variant for these attacks. A wide range of well-known ransomware families support remote malicious encryption, including Akira, BitPaymer, BlackCat, BlackMatter, Conti, Crytox, DarkSide, Dharma, LockBit, MedusaLocker, Phobos, Royal, Ryuk, and WannaCry.<\/p>\n<p>Furthermore, most endpoint security products are ineffective in this scenario because they focus on detecting malicious ransomware files and processes\u00a0<em>on the protected endpoint<\/em>. However, with remote encryption attacks, the processes run on the compromised machine, leaving the endpoint protection blind to the malicious activity.<\/p>\n<p>Fortunately, Sophos Endpoint includes robust protection against malicious remote encryption, powered by our industry-leading CryptoGuard protection.<\/p>\n<h2>Sophos CryptoGuard: Industry-leading, universal ransomware protection<\/h2>\n<p>Sophos Endpoint contains multiple layers of protection that defend organizations from ransomware, including CryptoGuard, our unique anti-ransomware technology that is included in all Sophos Endpoint subscriptions.<\/p>\n<p>Unlike other endpoint security solutions that solely look for malicious files and processes, CryptoGuard analyzes data files for signs of malicious encryption irrespective of where the processes are running. This approach makes it highly effective at stopping all forms of ransomware, including malicious remote encryption. If it detects malicious encryption, CryptoGuard automatically blocks the activity and rolls back files to their unencrypted states.<\/p>\n<p>CryptoGuard actively examines the content of all documents as files are read and written, using mathematical analysis to determine whether they have become encrypted. This universal approach is unique in the industry and enables Sophos Endpoint to stop ransomware attacks that other solutions miss, including remote attacks and never-before-seen ransomware variants.<\/p>\n<p><strong>Detects malicious encryption by analyzing file content<br \/>\n<\/strong>Unlike other solutions that look at ransomware from an anti-malware perspective by focusing on detecting malicious code, CryptoGuard looks for mass rapid encryption of files by analyzing content using mathematical algorithms.<\/p>\n<p><strong>Blocks both local and remote ransomware attacks<br \/>\n<\/strong>Because CryptoGuard focuses on the content of files, it can detect ransomware encryption attempts even when the malicious process is not running on the victim\u2019s device.<\/p>\n<p><strong>Automatically rolls back malicious encryption<br \/>\n<\/strong>CryptoGuard creates temporary backups of modified files and automatically rolls back changes when it detects mass encryption. Sophos uses a proprietary approach, unlike other solutions that use Windows Volume Shadow Copy, which adversaries are known to circumvent. There are no limits to the size and type of file that can be recovered, minimizing the impact on business productivity.<strong><br \/>\n<\/strong><\/p>\n<p><strong>Automatically blocks remote devices<br \/>\n<\/strong>In a remote ransomware attack, CryptoGuard automatically blocks the IP address of the remote device attempting to encrypt files on the victim\u2019s machine.<\/p>\n<p><strong>Protects the master boot record (MBR)<br \/>\n<\/strong>CryptoGuard also protects the device from ransomware that encrypts the master boot record (preventing startup) and from attacks that wipe the hard disk.<\/p>\n<p>CryptoGuard is one of the unique capabilities in Sophos Endpoint and is included with all Sophos Intercept X Advanced, Sophos XDR, and Sophos MDR subscriptions. What\u2019s more, the capability is enabled automatically by default, ensuring organizations enjoy full protection from both local and remote ransomware attacks straight away \u2013 no fine tuning or configuration required.<\/p>\n<h2>Discover unprotected devices<\/h2>\n<p>A single unprotected endpoint can leave your customers&#8217; organization vulnerable to a remote encryption attack. Deploying Sophos Endpoint provides robust universal ransomware protection from malicious encryption. But how can your customers identify if they have unprotected devices on their network in the first place?<\/p>\n<p>This is where\u00a0<a href=\"https:\/\/www.sophos.com\/en-us\/products\/managed-detection-and-response\/network-detection-and-response\">Sophos Network Detection and Response (NDR)<\/a>\u00a0can help. Sophos NDR monitors network traffic for suspicious flows and, in doing so, identifies unprotected devices and rogue assets in the environment.<\/p>\n<p><strong>For the strongest protection against remote ransomware attacks, recommend to install Sophos Endpoint on all customer machines in the environment and deploy Sophos NDR to discover unprotected devices on their network.<\/strong><\/p>\n<h2>A unique opportunity<\/h2>\n<p>Leverage this differentiated ransomware protection capability in Sophos Endpoint to drive new sales opportunities and renewals today. It is particularly helpful when defending against a move away from Sophos to Microsoft Defender: with the average cost to remediate a ransomware attack coming in at $1.82M, ask customers if they can afford to be exposed?<\/p>\n<p>Share the following new resources with your customers and take full advantage of this unique opportunity:<\/p>\n<ul>\n<li><a href=\"https:\/\/news.sophos.com\/en-us\/2023\/12\/07\/sophos-endpoint-industry-leading-protection-against-remote-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">Sophos News article<\/a> &#8211; explains what remote ransomware is, why most organizations are exposed to it, and how Sophos Endpoint stops it.<\/li>\n<li><a href=\"https:\/\/vimeo.com\/889667454\" target=\"_blank\" rel=\"noopener\">2-minute promo video<\/a> \u2013 great teaser for social media.<\/li>\n<li><a href=\"https:\/\/vimeo.com\/891087569\" target=\"_blank\" rel=\"noopener\">Expert explainer video<\/a> \u2013 Peter Mackenzie (Director, Incident Response) explains remote ransomware.<\/li>\n<\/ul>\n<p>We also offer the following assets for download from the partner portal:<\/p>\n<ul>\n<li><strong>Sophos Remote Ransomware Guide <\/strong>\u2013 Explains what remote ransomware is, why most organizations are exposed to it, and how Sophos Endpoint stops it.<\/li>\n<li><strong>Enablement video <\/strong>\u2013 Explains the sales opportunity<\/li>\n<li><strong>PowerPoint slides<\/strong> \u2013 Add these new slides to your own presentations.<\/li>\n<li><strong>Marketing Emails<\/strong>\u2013 Designed to promote the whitepaper and webinar.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/partners.sophos.com\/prm\/English\/s\/assets?renderMode=Collection&amp;q=%22remote%20ransomware%22\" target=\"_blank\" rel=\"noopener\">Access Asset Library<\/a><\/p>\n<h2>Plus, there\u2019s an NDR opportunity too!<\/h2>\n<p>80% of remote ransomware attack compromises originate on an unmanaged device. As described above, use this opportunity to demonstrate the importance of seeing what\u2019s on your customers&#8217; network and introduce <a href=\"https:\/\/partners.sophos.com\/prm\/English\/c\/selling-sophos-ndr\" target=\"_blank\" rel=\"noopener\">Sophos NDR<\/a> \u2013 now available for both Sophos MDR and Sophos XDR.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most leading endpoint solutions struggle to stop malicious remote encryption, but not Sophos.<\/p>\n","protected":false},"author":11,"featured_media":3000003581,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[72],"tags":[139,112,202],"coauthors":[204],"class_list":["post-7116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-ransomware","tag-sophos-endpoint","tag-sophos-ndr"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/08\/featured-image-sophos-endpoint-and-marque-app-icon-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/7116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/comments?post=7116"}],"version-history":[{"count":1,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/7116\/revisions"}],"predecessor-version":[{"id":7121,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/posts\/7116\/revisions\/7121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/media?parent=7116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/categories?post=7116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/tags?post=7116"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/es-es\/wp-json\/wp\/v2\/coauthors?post=7116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}