Sunday, 8 Feb 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Cisco Talos analyzes attack chains, network ransomware tactics
Global Market

Cisco Talos analyzes attack chains, network ransomware tactics

Last updated: July 11, 2024 9:59 pm
Published July 11, 2024
Share
A photograph of a laptop showing binary in red text, with ransomware written in white in a black rectangle in the middle of the screen. A hand in a black glove can be seen resting on the keyboard of the laptop.
SHARE

To keep away from detection, ransomware actors make use of “protection evasion strategies” corresponding to disabling or modifying safety software program, together with anti-virus packages and endpoint detection options. In addition they usually attempt to disable security measures within the working system to stop the detection of the ransomware payload,” Nutland wrote. “Adversaries may also usually obfuscate malicious software program by packing and compressing the code, finally unpacking itself in reminiscence when executed. They’ll additionally modify the system registry to disable safety alerts, configure the software program to execute at startup, or block sure restoration choices for customers.”

Talos famous a variety of further ransomware traits, together with:

  • MFA exploits: “Adversaries might ship emails containing malicious attachments or URL hyperlinks that can execute malicious code on the goal system, deploying the actors’ instruments and malware, and exploiting multi-factor authentication (MFA). There are numerous methods adversaries hope to bypass MFA, whether or not due to poor implementation or as a result of they have already got legitimate account credentials. Most notably, we now have seen an growing variety of ransomware associates trying to use vulnerabilities or misconfigurations in internet-facing techniques, corresponding to in legacy or unpatched software program.”
  • Looking for long-term entry: “…actors will look to ascertain long-term entry, guaranteeing that their operations will probably be profitable even when their preliminary intrusion is found and remediated.  Attackers usually use automated malware persistence mechanisms, corresponding to AutoStart execution upon system boot, or modify registry entries. Distant entry software program instruments and create native, area and/or cloud accounts will also be deployed to ascertain secondary credentialed entry.”
  • Enumerating goal environments: “Upon establishing persistent entry, risk actors will then try to enumerate the goal setting to know the community’s construction, find assets that may help the assault, and establish knowledge of worth that may be stolen in double extortion. Utilizing numerous native utilities and bonafide providers, they exploit weak entry controls and elevate privileges to the administrator stage to progress additional alongside the assault chain.”
  • Utilizing community scanner utilities: “We’ve got noticed the favored use of many community scanner utilities along with native working system instruments and utilities (living-off-the-land binaries) like Certutil, Wevtutil, Internet, Nltes and Netsh to mix in with typical working system features, exploit trusted functions and processes, and assist in malware supply.”
  • Double extortion: “Within the shifting focus to a double extortion mannequin, many adversaries acquire delicate or confidential info to ship to an exterior adversary-controlled useful resource or over some C2 mechanism. File compression and encryption utilities WinRAR and 7-Zip have been used to hide recordsdata for the unauthorized switch of knowledge, whereas adversaries usually exfiltrate recordsdata utilizing the beforehand talked about legit RMM instruments. Customized knowledge exfiltration instruments have been developed and utilized by the extra mature RaaS operations, providing customized tooling corresponding to Exbyte (BlackByte) and StealBit (LockBit) to facilitate knowledge theft.”
See also  SASE, multicloud spur greater collaboration between network and security teams

Earlier this yr Talos wrote that unhealthy actors who’re perpetrating superior persistent risk (APT) assaults aren’t simply seeking to entry your community. They need to sneak in and grasp round to gather useful knowledge or lay plans for future assaults. Submit-compromise threats are rising, and so they’re aimed largely at ageing community infrastructure and edge units which might be long gone end-of-life stage and will have important unpatched vulnerabilities.

A number of the issues companies can do to fight ransomware assaults embody often and persistently making use of patches and updates to all techniques and software program to handle vulnerabilities promptly and cut back the chance of exploitation, in accordance with Nutland. “Implement robust password insurance policies that require complicated, distinctive passwords for every account. Moreover, implement multi-factor authentication (MFA) so as to add an additional layer of safety,” Nutland acknowledged.

Segmenting the community to isolate delicate knowledge and techniques, stopping lateral motion in case of a breach. Along with using community entry management mechanisms corresponding to 802.1X to authenticate units earlier than granting community entry, guaranteeing solely approved system connections, Nutland wrote.

“Implement a Safety Info and Occasion Administration (SIEM) system to repeatedly monitor and analyze safety occasions, along with the deployment of EDR/XDR options on all shoppers and servers to offer superior risk detection, investigation, and response capabilities,” Nutland wrote.

Source link

TAGGED: analyzes, attack, chains, Cisco, Network, ransomware, tactics, Talos
Share This Article
Twitter Email Copy Link Print
Previous Article Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute
Next Article How AI is revolutionising game design and player experiences How AI is revolutionising game design and player experiences
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

JUPITER supercomputer propels Europe into the exascale era

Europe has formally entered the worldwide league of high-performance computing with the inauguration of the…

September 6, 2025

AI’s role in helping to prevent skin cancer through behaviour change

Prior to now 12 months, we’ve seen outstanding achievements throughout AI-assisted most cancers prognosis as…

September 12, 2024

Amazon enters European 5G market with O2 Telefónica cloud deal

O2 Telefónica in Germany, in partnership with Nokia, has made a groundbreaking transfer by deploying 5G…

May 16, 2024

Eurazeo Acquires Majority Stake in Mapal from PSG Equity

Eurazeo acquired a majority stake in Mapal, a Madrid, Spain-based operational administration software program supplier,…

March 1, 2025

AWS’s $18 Billion Investment Signals Cloud Surge

Canada's information middle panorama is present process a change, marked by important investments and technological…

March 2, 2024

You Might Also Like

Shutterstock Germany Only - News - Intel Factory Germany September 2024
Global Market

Intel sets sights on data center GPUs amid AI-driven infrastructure shifts

By saad
Side view of technician or engineer with headset and laptop standing in industrial factory.
Global Market

Is private 5G/6G important after all?

By saad
Levi’s Stadium hosts Super Bowl LX
Global Market

Super Bowl LX raises network expectations

By saad
A person watching a stream of videos on a tablet
Global Market

Ruckus makes some noise with preconfigured switches for AV-over-IP networks

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.