Source |
Mandiant |
Identifiant |
8377679 |
Date de publication |
2019-10-01 05:00:00 (vue: 2023-09-01 14:42:14) |
Titre |
Faux de tête: s'attaquer aux attaques de ransomware perturbatrices Head Fake: Tackling Disruptive Ransomware Attacks |
Texte |
Au cours des derniers mois, Fireeye a observé des menaces motivées financièrement les acteurs de la menace utilisés par les tactiques qui se concentrent sur la perturbation des processus commerciaux en déploiement des ransomwares en masse dans tout l'environnement d'une victime.Comprenant que les processus commerciaux normaux sont essentiels à la réussite organisationnelle, ces campagnes de ransomwares se sont accompagnées de montants de rançon de plusieurs millions de dollars.Dans cet article, nous fournirons un examen technique d'une campagne récente qui remonte à une technique sur laquelle nous avons initialement signalé dans avril 2018 .
Entre mai et septembre 2019, Fireeye a répondu à
Within the past several months, FireEye has observed financially-motivated threat actors employ tactics that focus on disrupting business processes by deploying ransomware in mass throughout a victim\'s environment. Understanding that normal business processes are critical to organizational success, these ransomware campaigns have been accompanied with multi-million dollar ransom amounts. In this post, we\'ll provide a technical examination of one recent campaign that stems back to a technique that we initially reported on in April 2018.
Between May and September 2019, FireEye responded to |
Notes |
★★★
|
Envoyé |
Oui |
Condensat |
2018 2019 accompanied actors amounts april are attacks back been between business campaign campaigns critical deploying disrupting disruptive dollar employ environment examination fake: financially fireeye focus has have head initially mass may million months motivated multi normal observed one organizational past post processes provide ransom ransomware recent reported responded september several stems success tackling tactics technical technique these threat throughout understanding victim within |
Tags |
Ransomware
Threat
|
Stories |
|
Move |
|