Threat research reports
Most cyber security companies produce various threat research reports, including those related to ransomware attacks, so such sources can be easily used for CTI collection. Threat research reports are a very important part of threat assessment. These reports help technical and non-technical people to assess their current landscape and measure it against the threat landscape.
Of course, no report contains all the details, so the best approach is to use research produced by various cyber security vendors focused on the same threat. At the same time, some reports provide indicators of compromise (IoCs) and other critical data that can be shared with the general public. Some of these reports can help others be prepared for these threat actors and their attacks.
In this section, we'll look at various reports on Egregor ransomware so that we can collect as much intelligence on its affiliates' TTPs as possible.
Let's start with the report by...