Investigating cloud service client application abuse for data exfiltration
Ransomware affiliates may use built-in tools, such as web browsers, for data exfiltration, but also can install and execute third-party tools to solve this task.
So, it's always a good idea to check for freshly installed programs, which may be related to activities performed by the threat actors. Such information can be collected from the SOFTWARE
registry file, which is located under C:\Windows\System32\config
.
Information about installed programs can be located under SOFTWARE
| Microsoft\Windows\CurrentVersion\Uninstall
:
We can get even more information on the installed application by checking the values of the MEGAsync
subkey:
MEGA provides the threat actors with great exfiltration capabilities, which is why many ransomware affiliates prefer...