|
KnowHow ► IT Security
Stopping Ransomware: Firewall Rules, TOR Blocking and Backup StrategyPractical ransomware defence checklist: patching, SMBv1 disabling, firewall port rules, C&C server blocking and a watertight backup strategy. Lessons from WannaCry – current for 2024/2025. |
Background: WannaCry and Its Successors
Since the devastating WannaCry attack on 12 May 2017, it has been clear: ransomware does not only hit individuals, but entire companies, hospitals and public authorities. The damage runs into billions. The good news: with the right precautions, the risk can be significantly reduced. Even though WannaCry has largely been contained, new and more sophisticated variants appear regularly. Act proactively.
Immediate Checklist: What Is Already Done?
|
Patches & Operating System ✓ MS17-010 and all current security patches installed? ✓ Current, Microsoft-supported OS? (Windows 10 or later recommended) ✓ Automatic updates enabled? |
Network & Protocols ✓ SMBv1 disabled company-wide? (Microsoft guide) ✓ Firewall blocks UDP 137/138 and TCP 139, 445 from the internet? ✓ TCP 3389 (RDP) blocked externally or restricted to VPN? |
Block TOR Communication
Many ransomware variants communicate with their command-and-control (C&C) servers via the TOR network. Block all outgoing TOR connections at the firewall. Known C&C addresses from the WannaCry campaign:
|
xxlvbrloxvriy2c5.onion cwwnhwhlz52ma.onion 57g7spgrzlojinas.onion gx7ekbenv2riucmf.onion 76jdd2ir2embyv47.onion |
BSI, CISA and commercial threat intelligence providers publish updated C&C block lists continuously. Keep your block lists current.
Antivirus & EDR
Modern endpoint protection is essential. Classic antivirus detects known signatures; Endpoint Detection & Response (EDR) solutions go further, detecting suspicious behaviour even without a known signature. Equally important is a rollback capability: damage incurred before detection can be undone automatically.
Rethink Your Backup Strategy
|
3-2-1 Rule At least 3 copies of your data, on 2 different media types, with 1 offsite (remote location or cloud air-gap). |
Attack-Resistant Backups Never use the backup server account for email or browsing. Restrict physical and network access. Offline media (tape, external HDD) cannot be encrypted by ransomware. |
Test Your Restore Run a full restore test regularly. Can all data be recovered in an acceptable timeframe? We have helped customers restore complete datasets in under 30 minutes. |
Key Behavioural Rules
- No downloads from unknown sources.
- Patch consistently – keep all systems up to date.
- Never open email links or attachments from unknown senders – and be cautious with known senders too (compromised systems send mail to all address book entries).
- Always maintain a current offline backup of important data.
|
Security consulting and training We support you from staff training to strategic security concepts: sales@industry-electronics.com | Tel. +49 (0)7666 / 88499-0 |
