
Test them regularly to make sure you can restore essential business functions swiftly. Keep backups offsite and offline, beyond the reach of attackers. Deploy Endpoint Detection and Response software like Malwarebytes EDR that uses multiple different detection techniques to identify ransomware. Use EDR or MDR to detect unusual activity before an attack occurs. Make it harder for intruders to operate inside your organization by segmenting networks and assigning access rights prudently. Create a plan for patching vulnerabilities in internet-facing systems quickly disable or harden remote access like RDP and VPNs use endpoint security software that can detect exploits and malware used to deliver ransomware. This could be through websites or other applications with internet accessible open sockets by exploiting known vulnerabilities or common security misconfigurations.įor those interested, the CSA contains a wealth of Indicators of Compromise (IOCs) and techniques used by Royal to gain persistence and for lateral movement. Exploiting public-facing applications.Remote Desktop Protocol (RDP), by using compromised or brute forcing login credentials.Phishing, by using emails containing malicious PDF documents, and malvertising.Other methods that are used to gain initial access to victim networks are: The Initial Access Brokers that cater to Royal are reported to gain initial access and source traffic by harvesting virtual private network (VPN) credentials from stealer logs. Steal data from infiltrated networks which they threaten to publicize on their leak site to increase the leverage on the victim.Have targeted numerous critical infrastructure sectors including manufacturing, communications, healthcare, and education.Are known to disable anti-virus software on the affected systems.




Royal ransomware is a Ransomware-as-a-service (Raas) that first made an appearance in January 2022. As part of its StopRansomware effort, the Cybersecurity and Infrastructure Security Agency (CISA) has published a Cybersecurity Advisory (CSA) about Royal ransomware.
