{"id":6698,"date":"2022-04-12T12:30:29","date_gmt":"2022-04-12T04:30:29","guid":{"rendered":"https:\/\/x-phy.com\/?p=6698"},"modified":"2022-04-12T12:30:29","modified_gmt":"2022-04-12T04:30:29","slug":"how-to-prevent-ransomware-insider-attack-use-case","status":"publish","type":"post","link":"https:\/\/x-phy.com\/how-to-prevent-ransomware-insider-attack-use-case\/","title":{"rendered":"How to Prevent Ransomware &#8211; Insider Attack use case"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6698\" class=\"elementor elementor-6698\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-10384b7f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10384b7f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4e27e242\" data-id=\"4e27e242\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-18300af3 elementor-widget elementor-widget-text-editor\" data-id=\"18300af3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Although many organizations are very enthusiastic about security measures like how to\u00a0<a href=\"https:\/\/x-phy.com\/solutions\/ransomware-protection\/\" target=\"_blank\" rel=\"noopener\">prevent ransomware<\/a>, they may ignore one key aspect of cyberattacks, i.e., <a href=\"https:\/\/x-phy.com\/solutions\/zero-trust\/\">insider threats.\u00a0<\/a><\/p><p>Jeremy is a black hat hacker who was hired by Kiosk Technologies in the department of IT audit. A rival of Kiosk Technologies offered him a handsome amount to be a spy employee and carry out a major <a href=\"https:\/\/x-phy.com\/glossary\/attack-vectors\/\">cyber-attack.<\/a><\/p><p>Right after joining the team, Jeremy studied the network and server infrastructure where he found several loopholes. Within a month, he became familiar with the entire network architecture and planned a major\u00a0<a href=\"https:\/\/x-phy.com\/glossary\/data-loss-prevention\/\" target=\"_blank\" rel=\"noopener\">data breach.<\/a>\u00a0He also investigated the office security and got the idea to enter the main office building in non-official working hours. At midnight he entered the main office building through the emergency fire exit and goes straight into the server room.<\/p><p>He was aware that the storage drives are self-encrypted. At first, he removed the cover of the desktop and disconnected the\u00a0<a href=\"https:\/\/x-phy.com\/\" target=\"_blank\" rel=\"noopener\">X-PHY\u00ae SSD<\/a>. The X-Site Secure feature detected the change in the ambient light.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6aa5b640\" data-id=\"6aa5b640\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2834fbf0 elementor-widget elementor-widget-text-editor\" data-id=\"2834fbf0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Recognizing the threat, the AI security engine immediately triggered the Motionlock to maintain the security of the\u00a0<a href=\"https:\/\/x-phy.com\/\" target=\"_blank\" rel=\"noopener\">X-PHY\u00ae<\/a>. He then connected the SSD to a USB hub and the desktop with SATA and power cables.<\/p><p>He arranged a Hot Plug Attack and started to boot the desktop, swapped the SATA cable, connected the X-PHY\u00ae to his laptop, and kept the power on for\u00a0<a href=\"https:\/\/x-phy.com\/glossary\/data-encryption\/\" target=\"_blank\" rel=\"noopener\">self-encryption data bypass.<\/a>\u00a0The continuous AI real-time monitoring detected the illegal trait and the Power Lock feature was activated. It locked down the data at the firmware kernel level.\u00a0<\/p><p>This ultimately failed his attempts because the self-encryption drive keys saved in the security system management were wiped off. It further triggered the 2-Factor Keycode under the X-Factor Encryption Lock feature to protect the data at a firmware level.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a3b2340 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a3b2340\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a6ae2a\" data-id=\"1a6ae2a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-69eaa2ce elementor-widget elementor-widget-text-editor\" data-id=\"69eaa2ce\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>X-PHY Protection Method<\/strong><\/h4><p>1. The Motionlock within the X-Site Secure feature detects the change in the ambient light upon the removal of desktop cover to disconnect the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">X PHY<sup>\u00ae<\/sup><\/a>.\u00a0<\/p><p>2. The AI real-time monitoring of the data operation at the kernel and firmware level detects the bypass trait and triggers the <a href=\"https:\/\/x-phy.com\/products\/enterprise\/server-defender\/technology\/\">Powerlock feature<\/a> to wipe the self-encryption drive keys saved in secure system management.<\/p><p>3. The X-Factor Encryption lock feature triggers data <a href=\"https:\/\/x-phy.com\/solutions\/financial-bfsi-cybersecurity\/\">lockdown<\/a> to prevent the attacker from accessing it and activates the Keycode 2-factor.<\/p><p>4. The X-PHY<sup>\u00ae<\/sup> enters safe mode and asks for the password to complete the 2-factor authentication.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d8ee0fd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d8ee0fd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6328dadb\" data-id=\"6328dadb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29cb1902 elementor-widget elementor-widget-image\" data-id=\"29cb1902\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"455\" height=\"409\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_20.png\" class=\"attachment-large size-large wp-image-6277\" alt=\"\" srcset=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_20.png 455w, https:\/\/x-phy.com\/wp-content\/uploads\/2021\/03\/Page_20-300x270.png 300w\" sizes=\"(max-width: 455px) 100vw, 455px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Although many organizations are very enthusiastic about security measures like how to\u00a0prevent ransomware, they may ignore one key aspect of cyberattacks, i.e., insider threats.\u00a0 Jeremy is a black hat hacker [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":6700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-6698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-use-cases"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/6698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=6698"}],"version-history":[{"count":0,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/6698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/6700"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=6698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=6698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=6698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}