Investigating cloud service client application abuse for data exfiltration
Ransomware affiliates may use built-in tools, such as web browsers, for data exfiltration, but also can install and execute third-party tools to solve this task.
So, it's always a good idea to check for freshly installed programs, which may be related to activities performed by the threat actors. Such information can be collected from the SOFTWARE
registry file, which is located under C:\Windows\System32\config
.
Information about installed programs can be located under SOFTWARE
| Microsoft\Windows\CurrentVersion\Uninstall
:
Figure 10.7 – Information on installed programs
We can get even more information on the installed application by checking the values of the MEGAsync
subkey:
Figure 10.8 – MEGAsync installation details
MEGA provides the threat actors with great exfiltration capabilities, which is why many ransomware affiliates prefer...