Incident Response Techniques for Ransomware Attacks by Oleg Skulkin
Author:Oleg Skulkin
Language: eng
Format: epub
Publisher: Packt Publishing Pvt Ltd
Published: 2022-03-10T00:00:00+00:00
As you can see, analyzing reports from various cyber security companies may provide us with great insights into ransomware affiliates' operations for us to use this CTI to make our IR engagements faster and more efficient.
In the next section, we'll look at how we can collect CTI from the cyber security community.
Community
There are thousands of incident responders worldwide, and of course, some of them like to share their findings from IR engagements. We already looked at some threat research reports, but it usually takes quite a lot of time to create one. Therefore, responders and researchers often use other media to share their findings in a short form. A very popular media platform for such sharing is Twitter.
If you are dealing with a human-operated ransomware attack and you already identified the strain, you may find quite a lot of information on the threat actors, including TTPs. Understanding the threat actor is critical. Usually, certain ransomware affiliates use specific tools and processes during certain stages of the attack life cycle.
Let's start with RagnarLocker ransomware and have a look at the following tweet from Peter Mackenzie, Director of Incident Response at Sophos (https://twitter.com/AltShiftPrtScn/status/1403707430765273095):
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(6921)
Robo-Advisor with Python by Aki Ranin(6840)
Offensive Shellcode from Scratch by Rishalin Pillay(5657)
Ego Is the Enemy by Ryan Holiday(4738)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4340)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4212)
Python for ArcGIS Pro by Silas Toms Bill Parker(3749)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3440)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3176)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3141)
Speed Up Your Python with Rust by Maxwell Flitton(3132)
Liar's Poker by Michael Lewis(3114)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3104)
Extreme DAX by Michiel Rozema & Henk Vlootman(3079)
Agile Security Operations by Hinne Hettema(3039)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3026)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2998)
Cryptography Algorithms by Massimo Bertaccini(2908)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2895)
