To understand how endpoint protection ransomware strategies can counter modern threats, you first need to know how ransomware works. Ransomware attackers follow a known path, although they sometimes use different tools to get there.
Initial access is often the first step, involving a vulnerable VPN, a phishing email, an open RDP port, or simply compromised credentials that attackers purchased on the dark web. Once they're inside, though, most ransomware operators are in no hurry to encrypt files. They're patient, knowing that on average, a ransomware attack takes 18 steps and 17 hours to execute.
Instead, they escalate their privileges, exploiting vulnerabilities or abusing built-in tools to gain access to the higher-level accounts they want, like administrator accounts and domain controllers.
Then comes lateral movement. Mapping the network, attackers jump between endpoints, hunting for high-value targets and valuable data, and may even exfiltrate valuable data before encrypting anything. This gives them more leverage in ransom demands: pay up, or we'll encrypt and leak your data.
Encryption is, of course, the final step. Attackers have now locked up data and the endpoints – potentially causing business disruptions like applications going down, unavailable data, and more.
Antivirus solutions may detect known malware binaries as they attempt to enter an environment, but managed EDR protects against ransomware, sees the entire attack path, and it detects suspicious behaviors at every stage.