Microsoft releases Fusion ransomware detection tool for Azure

Fusion Detection for Ransomware uses machine learning to spot malicious activity across a user's network

Microsoft has released a new ransomware detection feature for Azure that uses machine learning to spot potential attacks.

'Fusion Detection for Ransomware' will send an alert to customers when it observes actions that are "potentially associated with ransomware activities".

The alerts will inform users of what was detected, and on which device, with the system correlating data from other Azure services, such as Azure Defender, Microsoft Defender for Endpoint, Microsoft Defender for Identity, Microsoft Cloud App Security, and Azure Sentinel scheduled analytics rules.

Once ransomware activities are detected and correlated by the Fusion's machine learning model, a high severity incident with the label "Multiple alerts possibly related to Ransomware activity detected" will be triggered in the customer's Azure Sentinel workspace (shown in the image below).

A screenshot of the "multiple alerts" function on Fusion detection for ransomware

After an alert has been sent, Microsoft recommends users check the device/host in question to see if its behaviour is "unexpected". If so, the user should treat the machine as "potentially compromised" and take immediate actions, such as isolating the machine from the network, running full anti-virus scans, and investigating the rest of the network for similar signs.

Ransomware has become a lucrative occupation, according to a recent report from Unit 42, with average payouts almost doubling over the past year. Since 2020, payouts for successful ransomware attacks have increased 82% to a record $570,000 in the first half of 2021. The increase followed the previous year's 171% jump to more than $312,000.

"Preventing such attacks in the first place would be the ideal solution but with the new trend of 'ransomware as a service' and human operated ransomware, the scope and the sophistication of attacks are increasing - attackers are using slow and stealth techniques to compromise network, which makes it harder to detect them in the first place," Microsoft security researcher Sylvie Liu wrote in a blog post.

Featured Resources

How virtual desktop infrastructure enables digital transformation

Challenges and benefits of VDI

Free download

The Okta digital trust index

Exploring the human edge of trust

Free download

Optimising workload placement in your hybrid cloud

Deliver increased IT agility with the cloud

Free Download

Modernise endpoint protection and leave your legacy challenges behind

The risk of keeping your legacy endpoint security tools

Download now

Recommended

Sabbath hackers are targeting US schools and hospitals
ransomware

Sabbath hackers are targeting US schools and hospitals

29 Nov 2021
US government warns of increased risk of ransomware over holiday season
ransomware

US government warns of increased risk of ransomware over holiday season

24 Nov 2021
Out-of-hours ransomware attacks have a greater impact on revenue
ransomware

Out-of-hours ransomware attacks have a greater impact on revenue

18 Nov 2021
US and Israel join forces to fight ransomware
ransomware

US and Israel join forces to fight ransomware

15 Nov 2021

Most Popular

Sony pulls out of MWC 2022
Business operations

Sony pulls out of MWC 2022

14 Jan 2022
How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

6 Jan 2022
Dell XPS 15 (2021) review: The best just got better
Laptops

Dell XPS 15 (2021) review: The best just got better

14 Jan 2022