The Latest in IT Security

Techniques, tactics and procedures of ransomware

24
Jun
2022
Techniques, tactics and procedures of ransomware

image credit: adobe stock

Kaspersky experts conducted an in-depth analysis of the tactics, techniques, and procedures of the eight most common ransomware groups — Conti/Ryuk, Pysa, Clop, Hive, Lockbit2.0, RagnarLocker, BlackByte, and BlackCat. Comparing the methods and tools of attackers at different stages of attacks, they concluded that many groups operate rather similarly. This permits creation of effective universal countermeasures for protecting a company’s infrastructure from ransomware.

The study, with detailed analysis of all techniques and examples of their use in the wild, can be found in the Common TTPs of Modern Ransomware Groups report. It also contains rules for detecting malicious techniques in the SIGMA format.

Read More

Comments are closed.

Categories

SUNDAY, FEBRUARY 23, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments