Summary
Now you have a solid understanding of a typical human-operated ransomware attack. Of course, from a tactics, techniques, and procedures perspective, such attacks may be very different, but the main goals are almost always the same – to take full control of the domain, exfiltrate the most sensitive data, and deploy ransomware.
In the next chapter, we will look at the incident response process, and look at each of six stages from the angle of modern human-operated ransomware attacks.