Sunday, 14 Dec 2025
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Cisco Talos analyzes attack chains, network ransomware tactics
Global Market

Cisco Talos analyzes attack chains, network ransomware tactics

Last updated: July 11, 2024 9:59 pm
Published July 11, 2024
Share
A photograph of a laptop showing binary in red text, with ransomware written in white in a black rectangle in the middle of the screen. A hand in a black glove can be seen resting on the keyboard of the laptop.
SHARE

To keep away from detection, ransomware actors make use of “protection evasion strategies” corresponding to disabling or modifying safety software program, together with anti-virus packages and endpoint detection options. In addition they usually attempt to disable security measures within the working system to stop the detection of the ransomware payload,” Nutland wrote. “Adversaries may also usually obfuscate malicious software program by packing and compressing the code, finally unpacking itself in reminiscence when executed. They’ll additionally modify the system registry to disable safety alerts, configure the software program to execute at startup, or block sure restoration choices for customers.”

Talos famous a variety of further ransomware traits, together with:

  • MFA exploits: “Adversaries might ship emails containing malicious attachments or URL hyperlinks that can execute malicious code on the goal system, deploying the actors’ instruments and malware, and exploiting multi-factor authentication (MFA). There are numerous methods adversaries hope to bypass MFA, whether or not due to poor implementation or as a result of they have already got legitimate account credentials. Most notably, we now have seen an growing variety of ransomware associates trying to use vulnerabilities or misconfigurations in internet-facing techniques, corresponding to in legacy or unpatched software program.”
  • Looking for long-term entry: “…actors will look to ascertain long-term entry, guaranteeing that their operations will probably be profitable even when their preliminary intrusion is found and remediated.  Attackers usually use automated malware persistence mechanisms, corresponding to AutoStart execution upon system boot, or modify registry entries. Distant entry software program instruments and create native, area and/or cloud accounts will also be deployed to ascertain secondary credentialed entry.”
  • Enumerating goal environments: “Upon establishing persistent entry, risk actors will then try to enumerate the goal setting to know the community’s construction, find assets that may help the assault, and establish knowledge of worth that may be stolen in double extortion. Utilizing numerous native utilities and bonafide providers, they exploit weak entry controls and elevate privileges to the administrator stage to progress additional alongside the assault chain.”
  • Utilizing community scanner utilities: “We’ve got noticed the favored use of many community scanner utilities along with native working system instruments and utilities (living-off-the-land binaries) like Certutil, Wevtutil, Internet, Nltes and Netsh to mix in with typical working system features, exploit trusted functions and processes, and assist in malware supply.”
  • Double extortion: “Within the shifting focus to a double extortion mannequin, many adversaries acquire delicate or confidential info to ship to an exterior adversary-controlled useful resource or over some C2 mechanism. File compression and encryption utilities WinRAR and 7-Zip have been used to hide recordsdata for the unauthorized switch of knowledge, whereas adversaries usually exfiltrate recordsdata utilizing the beforehand talked about legit RMM instruments. Customized knowledge exfiltration instruments have been developed and utilized by the extra mature RaaS operations, providing customized tooling corresponding to Exbyte (BlackByte) and StealBit (LockBit) to facilitate knowledge theft.”
See also  Native Stablecoins Swell on Sui as Agora Adds AUSD Stablecoin to Network

Earlier this yr Talos wrote that unhealthy actors who’re perpetrating superior persistent risk (APT) assaults aren’t simply seeking to entry your community. They need to sneak in and grasp round to gather useful knowledge or lay plans for future assaults. Submit-compromise threats are rising, and so they’re aimed largely at ageing community infrastructure and edge units which might be long gone end-of-life stage and will have important unpatched vulnerabilities.

A number of the issues companies can do to fight ransomware assaults embody often and persistently making use of patches and updates to all techniques and software program to handle vulnerabilities promptly and cut back the chance of exploitation, in accordance with Nutland. “Implement robust password insurance policies that require complicated, distinctive passwords for every account. Moreover, implement multi-factor authentication (MFA) so as to add an additional layer of safety,” Nutland acknowledged.

Segmenting the community to isolate delicate knowledge and techniques, stopping lateral motion in case of a breach. Along with using community entry management mechanisms corresponding to 802.1X to authenticate units earlier than granting community entry, guaranteeing solely approved system connections, Nutland wrote.

“Implement a Safety Info and Occasion Administration (SIEM) system to repeatedly monitor and analyze safety occasions, along with the deployment of EDR/XDR options on all shoppers and servers to offer superior risk detection, investigation, and response capabilities,” Nutland wrote.

Source link

TAGGED: analyzes, attack, chains, Cisco, Network, ransomware, tactics, Talos
Share This Article
Twitter Email Copy Link Print
Previous Article Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute
Next Article How AI is revolutionising game design and player experiences How AI is revolutionising game design and player experiences
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Why we need to check the gen AI hype and get back to reality

Be part of our every day and weekly newsletters for the most recent updates and…

September 2, 2024

Green Data Center Market is projected to reach USD 233.87 billion

Inexperienced Information Heart MarketInexperienced Information Heart Market Report Scope and Analysis Methodology: The Inexperienced Information…

February 24, 2024

Zoth Launches First Ever RWA Restaking Layer with ZeUSD, Announces Exclusive Pre-Deposit Campaign

Dubai, UAE, January twenty seventh, 2025, Chainwire Zoth has unveiled its Pre-Deposit Marketing campaign, as…

January 27, 2025

Runloop lands $7M to power AI coding agents with cloud-based devboxes

Need smarter insights in your inbox? Join our weekly newsletters to get solely what issues…

July 30, 2025

Simplifying EU AI Act compliance for trustworthy AI

The ACHILLES project helps organisations translate the EU AI Act ideas into lighter, clearer, safer…

August 7, 2025

You Might Also Like

shutterstock 2291065933 space satellite in orbit above the Earth white clouds and blue sea below
Global Market

Aetherflux joins the race to launch orbital data centers by 2027

By saad
Data center / enterprise networking
Global Market

P4 programming: Redefining what’s possible in network infrastructure

By saad
Why data centre megadeals must prove their value
Global Market

Why data centre megadeals must prove their value

By saad
photo illustration of clouds in the shape of dollar signs above a city
Global Market

Cloud providers continue to push EU court to undo Broadcom-VMware merger

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.