Ransomware Detection

Overview

The Lightbeam Ransomware Detection feature is designed to identify ransomware notes within your organization's data sources. This feature automatically classifies text files that contain threatening language, contact information, and payment demands typically left by attackers after encrypting or compromising data.

Key Benefits

  • Automated Detection: Identifies ransomware notes without manual intervention

  • Policy-Based Alerting: Configure custom alerts when ransomware notes are detected

  • Classification: Provides classification labels for detected threats

  • Integration: Works seamlessly with existing Lightbeam data discovery workflows

Feature Capabilities

Detection Scope

  • File Types: Currently supports text files (.txt) only

  • Content Analysis: Identifies threatening language patterns

  • Contact Information: Detects attacker communication channels

  • Payment Demands: Recognizes ransom payment requests

Classification Labels

  • Files identified as ransomware notes receive the "Ransomware" sublabel classification

  • Detailed attributes and metadata capture

NOTE: - File Type Support: Limited to text files (.txt) only. - Language Support: Optimized for English-language ransomware notes

Prerequisites

Before configuring ransomware detection, ensure you have:

  1. Data Source Access: Configured data sources in Lightbeam (Google Drive, file shares, etc.)

  2. Scanning Permissions: Appropriate permissions to scan target directories

  3. Policy Management: Administrative rights to create detection policies

Figure 3. Ransomware File Listing
Ransomware Note Content

Configuration Steps

Step 1: Access Data Sources

  • Navigate to Datasources in the main navigation menu

Datasource Overview
  • Select your target data source (e.g., "RSW" Google Drive)

  • Ensure the data source shows "Scanning" status

Step 2: Configure Scan Settings

  • Click on your data source name to access configuration

  • Navigate to Configuration in the left sidebar

  • Click on Scan settings.

  • Click on Edit to make changes.

  • Select one out of the given option to configure: i) Scan all Drives ii) Scan selected Drives iii) Scan folder

  • You have the option to Scan only shared drives if needed.

If you selected Scan all Drives, then ensure Exclusion lists are properly configured.

If you selected Scan selected Drives, then ensure Inclusion lists are properly configured.

  • Click on Save.

  • Once the scanning configurations have been saved, click on the '>' sign in the left sidebar to open it.

  • Click on the Files row.

  • If the scanning is finished, the screen will display the scanned datasource with document categories. You can also view each file in a row by clicking the row icon to the right.

  • Each file that has a ransomware threat will be highlighted with the label 'Ransomware Note' under Doc Classification.

  • Click on a file to open it.

  • Under the Details tab, the Classification section displays the label "Ransomware Note" and "Ransomware".

Creating Alert Policies

Step 1: Navigate to Policies

  • Go to Playbooks > Policies

  • Click Create New Rule Set or Create New in the Discovery & Classification section.

Step 2: Configure Policy Details

  • Policy Type: Select "Discovery & Classification: Detection" or ensure that it says Discovery & Classification: Detection.

  • Rule Set Name: Enter "Policy for Ransomware" (or custom name)

  • Rule Set Description: Add descriptive text

Step 3: Set Rule Criteria

  • Condition: Set to "Any of these (OR)"

  • Document Classification: Select "Ransomware Note". In the classification selection:

    • Check "Ransomware"

  • To ensure proper file type restrictions, click Add File Type Condition.

  • Check Text and Word Processing and keep all the file types that get automatically get checked on the right.

Step 4 : Data Source Selection

  1. Select Data Sources: Choose your configured data sources

  2. Verify "All drive(s) included" for comprehensive coverage

Step 5: Alert Configuration

  • Receive alerts: Set to "Enabled"

  • Assign Alert to: Select "Datasource Owner(s)" or specific users

  • Alert Notification: Configure notification preferences

Step 6: Finalize Policy

  • Review all settings in the Summary panel

  • Click "Save & Close" to activate the policy

Alert Management

  • Navigate to Playbooks > Alerts

  • Review triggered ransomware detection alerts

  • Alerts show detection notifications when ransomware notes are found

Last updated