Главная
Study mode:
on
1
Introduction
2
Ransomware trends
3
Rival
4
Arrival Breach
5
Reconnaissance
6
Deploy Ransomware
7
Rival Ransomware
8
Life Cycle
9
How it works
10
catwalk
11
Data theft
12
Cobalt Strike
13
Double Payment
14
Stage 1 Enumeration
15
Stage 2 After Service
16
Stage 3 Boot Database
17
Stage 4 Reboot
18
Takeaways
19
Conclusions
20
Whats next
21
Edge devices
Description:
Explore the evolving landscape of ransomware operations in this 36-minute Black Hat conference talk. Delve into the increasing sophistication of ransomware attacks, focusing on their impact on European companies. Examine the trends of larger ransom demands, smarter attackers, and prolonged intrusions. Learn about the Rival ransomware's life cycle, including breach methods, reconnaissance, deployment techniques, and data theft strategies. Understand the multi-stage process involving enumeration, after-service, boot database manipulation, and system reboots. Gain insights into the use of tools like Cobalt Strike and the double payment tactic. Conclude with key takeaways, future predictions, and the potential targeting of edge devices in ransomware operations.

It's Not Finished - The Evolving Maturity in Ransomware Operations

Black Hat
Add to list
0:00 / 0:00