Ransomware operators have begun to shift their malicious behavior before encrypting files. This tactic has made it more difficult for an organization to distinguish from legitimate user activity through the use of applications already installed on network systems ("living-of-the-land" techniques), off-the-shelf red team tools, and Windows utilities.
Recorded Future's team of expert cyber threat analysts researched malicious actors with a specific focus on "big game" ransomware operators. Attend this webinar to find out what they discovered.
In this webinar you'll get: - Best practices and methodologies that organizations can use to detect threats
- Specific examples of actual compromises by ransomware operators, analyzing their techniques, procedures and tool usage to derive detections
- Guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase
|