Sunday, 1 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Cisco Talos analyzes attack chains, network ransomware tactics
Global Market

Cisco Talos analyzes attack chains, network ransomware tactics

Last updated: July 11, 2024 9:59 pm
Published July 11, 2024
Share
A photograph of a laptop showing binary in red text, with ransomware written in white in a black rectangle in the middle of the screen. A hand in a black glove can be seen resting on the keyboard of the laptop.
SHARE

To keep away from detection, ransomware actors make use of “protection evasion strategies” corresponding to disabling or modifying safety software program, together with anti-virus packages and endpoint detection options. In addition they usually attempt to disable security measures within the working system to stop the detection of the ransomware payload,” Nutland wrote. “Adversaries may also usually obfuscate malicious software program by packing and compressing the code, finally unpacking itself in reminiscence when executed. They’ll additionally modify the system registry to disable safety alerts, configure the software program to execute at startup, or block sure restoration choices for customers.”

Talos famous a variety of further ransomware traits, together with:

  • MFA exploits: “Adversaries might ship emails containing malicious attachments or URL hyperlinks that can execute malicious code on the goal system, deploying the actors’ instruments and malware, and exploiting multi-factor authentication (MFA). There are numerous methods adversaries hope to bypass MFA, whether or not due to poor implementation or as a result of they have already got legitimate account credentials. Most notably, we now have seen an growing variety of ransomware associates trying to use vulnerabilities or misconfigurations in internet-facing techniques, corresponding to in legacy or unpatched software program.”
  • Looking for long-term entry: “…actors will look to ascertain long-term entry, guaranteeing that their operations will probably be profitable even when their preliminary intrusion is found and remediated.  Attackers usually use automated malware persistence mechanisms, corresponding to AutoStart execution upon system boot, or modify registry entries. Distant entry software program instruments and create native, area and/or cloud accounts will also be deployed to ascertain secondary credentialed entry.”
  • Enumerating goal environments: “Upon establishing persistent entry, risk actors will then try to enumerate the goal setting to know the community’s construction, find assets that may help the assault, and establish knowledge of worth that may be stolen in double extortion. Utilizing numerous native utilities and bonafide providers, they exploit weak entry controls and elevate privileges to the administrator stage to progress additional alongside the assault chain.”
  • Utilizing community scanner utilities: “We’ve got noticed the favored use of many community scanner utilities along with native working system instruments and utilities (living-off-the-land binaries) like Certutil, Wevtutil, Internet, Nltes and Netsh to mix in with typical working system features, exploit trusted functions and processes, and assist in malware supply.”
  • Double extortion: “Within the shifting focus to a double extortion mannequin, many adversaries acquire delicate or confidential info to ship to an exterior adversary-controlled useful resource or over some C2 mechanism. File compression and encryption utilities WinRAR and 7-Zip have been used to hide recordsdata for the unauthorized switch of knowledge, whereas adversaries usually exfiltrate recordsdata utilizing the beforehand talked about legit RMM instruments. Customized knowledge exfiltration instruments have been developed and utilized by the extra mature RaaS operations, providing customized tooling corresponding to Exbyte (BlackByte) and StealBit (LockBit) to facilitate knowledge theft.”
See also  BCS Consultancy appoints Chris Coward as COO

Earlier this yr Talos wrote that unhealthy actors who’re perpetrating superior persistent risk (APT) assaults aren’t simply seeking to entry your community. They need to sneak in and grasp round to gather useful knowledge or lay plans for future assaults. Submit-compromise threats are rising, and so they’re aimed largely at ageing community infrastructure and edge units which might be long gone end-of-life stage and will have important unpatched vulnerabilities.

A number of the issues companies can do to fight ransomware assaults embody often and persistently making use of patches and updates to all techniques and software program to handle vulnerabilities promptly and cut back the chance of exploitation, in accordance with Nutland. “Implement robust password insurance policies that require complicated, distinctive passwords for every account. Moreover, implement multi-factor authentication (MFA) so as to add an additional layer of safety,” Nutland acknowledged.

Segmenting the community to isolate delicate knowledge and techniques, stopping lateral motion in case of a breach. Along with using community entry management mechanisms corresponding to 802.1X to authenticate units earlier than granting community entry, guaranteeing solely approved system connections, Nutland wrote.

“Implement a Safety Info and Occasion Administration (SIEM) system to repeatedly monitor and analyze safety occasions, along with the deployment of EDR/XDR options on all shoppers and servers to offer superior risk detection, investigation, and response capabilities,” Nutland wrote.

Source link

TAGGED: analyzes, attack, chains, Cisco, Network, ransomware, tactics, Talos
Share This Article
Twitter Email Copy Link Print
Previous Article Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute
Next Article How AI is revolutionising game design and player experiences How AI is revolutionising game design and player experiences
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

CSP Vultr launches sovereign cloud services

Vultr Sovereign Cloud and Personal Cloud are designed for governments, analysis establishments, and enterprises, offering…

April 23, 2024

AtlasEdge Scores $292M for Lisbon Data Centers

UK-based knowledge heart firm AtlasEdge will make the most of $292 million in sustainability-linked funding…

October 31, 2025

GA Drilling Announces First Close of $15M Funding

GA Drilling, a Houston, TX-based firm which makes a speciality of deep geothermal power, raised…

April 18, 2024

Exploring crypto power consumption and sustainable data centres

Crypto has develop into a phenomenon that marks a brand new period in on-line finance;…

November 19, 2025

Bardeen Raises $3M in Funding

Bardeen co-founders Artem Harutyunyan and Pascal Weinberger (Picture: Enterprise Wire) Bardeen, a San Francisco, CA-based…

August 9, 2024

You Might Also Like

Panoramic high speed technology in big city concept, light abstract background.
Global Market

Netskope targets AI-driven network bottlenecks with AI Fast Path

By saad
H1 2026 - Data Centre Review
Global Market

H1 2026 – Data Centre Review

By saad
Juniper Networks
Global Market

Security hole could let hackers take over Juniper Networks PTX core routers

By saad
CPP Investments and Equinix to buy atNorth in $4 billion deal
Global Market

CPP Investments and Equinix to buy atNorth in $4 billion deal

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.