Ransomware operators targeting large organizations have begun to move more strategically. By using applications already installed on network systems (“living-off-the-land” techniques), off-the-shelf red team tools, and Windows utilities, their malicious behavior before encrypting files has become more difficult to distinguish from legitimate activity.
Recorded Future's cyber threat analysts researched malicious actors using living-off-the-land techniques, open source resources, and red team tools, with a specific focus on “big game” ransomware operators, to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase. The team looked at actual compromises by ransomware operators, analyzing their techniques, procedures and tool usage to derive detections.
Upcoming Live Webinars: Our webinars feature insights from well-known security intelligence experts.
Related Resource: Learn more about what Recorded Future's researchers gleaned about the SolarWinds attack.
Copyright © 2024 Recorded Future, Inc. | Privacy Policy