Saturday, 11 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Cisco Talos analyzes attack chains, network ransomware tactics
Global Market

Cisco Talos analyzes attack chains, network ransomware tactics

Last updated: July 11, 2024 9:59 pm
Published July 11, 2024
Share
A photograph of a laptop showing binary in red text, with ransomware written in white in a black rectangle in the middle of the screen. A hand in a black glove can be seen resting on the keyboard of the laptop.
SHARE

To keep away from detection, ransomware actors make use of “protection evasion strategies” corresponding to disabling or modifying safety software program, together with anti-virus packages and endpoint detection options. In addition they usually attempt to disable security measures within the working system to stop the detection of the ransomware payload,” Nutland wrote. “Adversaries may also usually obfuscate malicious software program by packing and compressing the code, finally unpacking itself in reminiscence when executed. They’ll additionally modify the system registry to disable safety alerts, configure the software program to execute at startup, or block sure restoration choices for customers.”

Talos famous a variety of further ransomware traits, together with:

  • MFA exploits: “Adversaries might ship emails containing malicious attachments or URL hyperlinks that can execute malicious code on the goal system, deploying the actors’ instruments and malware, and exploiting multi-factor authentication (MFA). There are numerous methods adversaries hope to bypass MFA, whether or not due to poor implementation or as a result of they have already got legitimate account credentials. Most notably, we now have seen an growing variety of ransomware associates trying to use vulnerabilities or misconfigurations in internet-facing techniques, corresponding to in legacy or unpatched software program.”
  • Looking for long-term entry: “…actors will look to ascertain long-term entry, guaranteeing that their operations will probably be profitable even when their preliminary intrusion is found and remediated.  Attackers usually use automated malware persistence mechanisms, corresponding to AutoStart execution upon system boot, or modify registry entries. Distant entry software program instruments and create native, area and/or cloud accounts will also be deployed to ascertain secondary credentialed entry.”
  • Enumerating goal environments: “Upon establishing persistent entry, risk actors will then try to enumerate the goal setting to know the community’s construction, find assets that may help the assault, and establish knowledge of worth that may be stolen in double extortion. Utilizing numerous native utilities and bonafide providers, they exploit weak entry controls and elevate privileges to the administrator stage to progress additional alongside the assault chain.”
  • Utilizing community scanner utilities: “We’ve got noticed the favored use of many community scanner utilities along with native working system instruments and utilities (living-off-the-land binaries) like Certutil, Wevtutil, Internet, Nltes and Netsh to mix in with typical working system features, exploit trusted functions and processes, and assist in malware supply.”
  • Double extortion: “Within the shifting focus to a double extortion mannequin, many adversaries acquire delicate or confidential info to ship to an exterior adversary-controlled useful resource or over some C2 mechanism. File compression and encryption utilities WinRAR and 7-Zip have been used to hide recordsdata for the unauthorized switch of knowledge, whereas adversaries usually exfiltrate recordsdata utilizing the beforehand talked about legit RMM instruments. Customized knowledge exfiltration instruments have been developed and utilized by the extra mature RaaS operations, providing customized tooling corresponding to Exbyte (BlackByte) and StealBit (LockBit) to facilitate knowledge theft.”
See also  Network digital twin technology faces headwinds

Earlier this yr Talos wrote that unhealthy actors who’re perpetrating superior persistent risk (APT) assaults aren’t simply seeking to entry your community. They need to sneak in and grasp round to gather useful knowledge or lay plans for future assaults. Submit-compromise threats are rising, and so they’re aimed largely at ageing community infrastructure and edge units which might be long gone end-of-life stage and will have important unpatched vulnerabilities.

A number of the issues companies can do to fight ransomware assaults embody often and persistently making use of patches and updates to all techniques and software program to handle vulnerabilities promptly and cut back the chance of exploitation, in accordance with Nutland. “Implement robust password insurance policies that require complicated, distinctive passwords for every account. Moreover, implement multi-factor authentication (MFA) so as to add an additional layer of safety,” Nutland acknowledged.

Segmenting the community to isolate delicate knowledge and techniques, stopping lateral motion in case of a breach. Along with using community entry management mechanisms corresponding to 802.1X to authenticate units earlier than granting community entry, guaranteeing solely approved system connections, Nutland wrote.

“Implement a Safety Info and Occasion Administration (SIEM) system to repeatedly monitor and analyze safety occasions, along with the deployment of EDR/XDR options on all shoppers and servers to offer superior risk detection, investigation, and response capabilities,” Nutland wrote.

Source link

TAGGED: analyzes, attack, chains, Cisco, Network, ransomware, tactics, Talos
Share This Article
Twitter Email Copy Link Print
Previous Article Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute Data Center Electricity Use II: How Are Electrons Like Fish? | American Enterprise Institute
Next Article How AI is revolutionising game design and player experiences How AI is revolutionising game design and player experiences
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Pres. Biden calls to ban AI voice impersonation in SOTU

Be part of leaders in Boston on March 27 for an unique night time of…

March 11, 2024

As international travel grows, so does US use of technology. A look at how it’s used at airports

Piet De Staercke, from again proper to left, together with his spouse Jill Bornauw, their…

April 3, 2024

European Tech Sector Unveils Sovereign Edge Cloud Initiative

The European Union’s tech panorama has achieved a major milestone with the launch of virt8ra, Europe's…

January 21, 2025

New training technique opens the door to neural networks that require much less energy

Credit score: CC0 Public Area AI purposes like ChatGPT are primarily based on synthetic neural…

January 14, 2025

How automation is assisting forensic scientists in shoe print identification

Credit: Pixabay/CC0 Public Domain On the morning of Dec. 21, 1999, William Fyfe went to…

February 13, 2024

You Might Also Like

Why sovereignty now shapes data centre planning in Europe
Global Market

Why sovereignty now shapes data centre planning in Europe

By saad
Heat emission from the chimneys of a large data and server complex.
Global Market

OpenAI puts part of Stargate project on hold over runaway power costs

By saad
EMEA data centre vacancy hits record low as AI demand outpaces supply
Global Market

EMEA data centre vacancy hits record low as AI demand outpaces supply

By saad
Germany only - Google erweitert Gemini-Portfolio mit kosteneffizienten Modellen
Global Market

Google owns the most AI compute, and it built it its way

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.