• Latest
  • Trending
  • All
  • cPanel

The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

June 23, 2022

Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments

August 9, 2022

MrKaplan – Tool Aimed To Help Red Teamers To Stay Hidden By Clearing Evidence Of Execution

August 9, 2022

Andariel deploys DTrack and Maui ransomware

August 9, 2022

How to Create CyberPanel Backups – InMotion Hosting Support Center

August 9, 2022

InMotion Hosting Reseller Hosting vs A2 Hosting Reseller Hosting – InMotion Hosting Support Center

August 9, 2022

Square Function in MATLAB

August 9, 2022
Tutorial
  • cPanel
  • News
  • Technology
    • Coding
    • Hosting
    • Gadgets
  • Cyber Security
No Result
View All Result
Tutorial
  • cPanel
  • News
  • Technology
    • Coding
    • Hosting
    • Gadgets
  • Cyber Security
No Result
View All Result
Tutorial
No Result
View All Result
Home Cyber Security

The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

anchani by anchani
June 23, 2022
in Cyber Security
Reading Time: 3 mins read
283 9
A A
0
547
SHARES
3.6k
VIEWS
Share on FacebookShare on Twitter


These days ransomware analysis gets a lot of coverage in commercial and public reports, with vendors issuing dozens of ransomware-related publications each year. These reports provide analysis on specific malware families or new samples, describe the activities of a particular ransomware group, give general tips on how to prevent ransomware from working, and so on. Malware analysts and security professionals can learn a lot from these reports, but not much of the content has an immediate or practical use. With the release of the report Common TTPs of modern ransomware, Kaspersky experts have taken a different approach. We want to familiarize the reader with the different stages of ransomware deployment, how cybercriminals use RATs and other tools across the various stages and what they aim to achieve. The report also provides a visual guide to defending against targeted ransomware attacks, using the most prolific groups as examples, and introduces the reader to the SIGMA detection rules that we created.

What are the ransomware groups?

For the report we selected the eight most common ransomware groups:

  1. Conti/Ryuk
  2. Pysa
  3. Clop (TA505)
  4. Hive
  5. Lockbit2.0
  6. RagnarLocker
  7. BlackByte
  8. BlackCat

We analyzed in detail the attacks these groups perpetrated and employed techniques and tactics described in MITRE ATT&CK to identify a large number of shared TTPs. By tracking all the groups and detecting their attacks, we saw that the core techniques remain the same throughout the cyber kill chain. The attack patterns revealed are not accidental because this class of attack requires the hackers to go through certain stages, such as penetrating the corporate network or victim’s computer, delivering malware, further discovery, account hijacking, deleting shadow copies, removing backups and, finally, achieving their objectives.

To highlight the common components and TTPs shared by the ransomware groups across different attack patterns, we’ve created a common cyber kill chain diagram. It provides a visual representation of the techniques and tactics used by different ransomware operators.

Once the incident data relating to the ransomware groups has been collected, we can identify the TTPs characteristic of each of them and then superimpose these onto the shared cyber kill chain. The arrows indicate the sequence of specific techniques and the colours mark the individual groups that have been known to deploy these techniques.

Whom is the report for?

This report is written for SOC analysts, threat hunting teams, cyberthreat intelligence analysts, digital forensics specialists and cybersecurity specialists that are involved in the incident response process and/or want to protect the environment they are responsible for from targeted ransomware attacks. Our main goal is to help with understanding how ransomware groups generally operate and how to defend against their attacks.

You can use this report as a book of knowledge on the main techniques used by ransomware groups, for writing hunting rules and for auditing your security solutions.

The report contains

  • Tactics, techniques and procedures (TTPs) of eight modern ransomware groups: Conti/Ryuk, Pysa, Clop (TA505), Hive, Lockbit2.0, RagnarLocker, BlackByte, and BlackCat
  • A description of how different groups share more than half of the common components and TTPs, with the core attack stages being executed identically across groups
  • A cyber kill chain diagram that combines the visible intersections and common elements of the selected ransomware groups and makes it possible to predict the threat actors’ next steps
  • A detailed analysis of each technique with examples of how they are being used by various groups and a comprehensive list of mitigations
  • SIGMA rules based on described TTPs that can be applied to SIEM solutions

 Common TTPs of modern ransomware (PDF)



Source link

Previous Post

Website Terminology: 160+ Web Jargons Explained

Next Post

WEF – Wi-Fi Exploitation Framework

anchani

anchani

Related Posts

Cyber Security

Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments

August 9, 2022
Cyber Security

MrKaplan – Tool Aimed To Help Red Teamers To Stay Hidden By Clearing Evidence Of Execution

August 9, 2022
Cyber Security

Andariel deploys DTrack and Maui ransomware

August 9, 2022
Next Post

WEF - Wi-Fi Exploitation Framework

TrelloC2 - Simple C2 Over The Trello API

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You might also like

Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments

August 9, 2022

MrKaplan – Tool Aimed To Help Red Teamers To Stay Hidden By Clearing Evidence Of Execution

August 9, 2022

Andariel deploys DTrack and Maui ransomware

August 9, 2022

How to Create CyberPanel Backups – InMotion Hosting Support Center

August 9, 2022

InMotion Hosting Reseller Hosting vs A2 Hosting Reseller Hosting – InMotion Hosting Support Center

August 9, 2022

Square Function in MATLAB

August 9, 2022
Host Help

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

  • Home
  • cPanel
  • Technology
  • Gadget
  • Design

© 2022 HostHelp.org -Tutorials for your hosting solutions HostHelp.org.

No Result
View All Result
  • cPanel
  • News
  • Technology
    • Coding
    • Hosting
    • Gadgets
  • Cyber Security

© 2022 HostHelp.org -Tutorials for your hosting solutions HostHelp.org.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In