Skip to main content

Hersteller-News

Ransomware Incognito: 5 Tools Targeted Ransomware Groups Use to Disguise Themselves

29. März 2021

Illusive Logo RoyalBlue RGBThis is part 2 of a 3-part series looking at the evolving nature and sophistication of ransomware attacks. This series is a snapshot from the comprehensive eBook on the topic, Ransomware, Inc: The Rise of Targeted Ransomware Crime Syndicates, published by Alissa Valentina Knight and Knight Ink, and commissioned by Illusive. Read part 1, The Major Ransomware Threat Groups and What Makes Them Effective

Targeted ransomware attackers are well beyond the old “spray and pray” attacks of old. They study the IT environment of the organizations they are targeted, research (to the extent possible) the tools used by those IT teams, move deliberately to avoid suspicion, and tailor their ransomware code to the specific targets. 

Yet how do they pivot laterally while avoiding security team detection? Well, first they need credentials.   ...read more!