Accessing credentials
As in most cases, ransomware affiliates want to encrypt as many hosts as possible, so they must be able to move laterally or at least run malicious code remotely. To do so silently and successfully, they prefer to obtain elevated credentials first, but, their main goal is to obtain the domain administrator account.
There are quite a few techniques that enable threat actors to obtain authentication material. Let's look at the most common ones.
Brute force (T1110)
As you may recall, RDP, VPN, and other external remote services are extremely common for human-operated ransomware attacks. Such services are poorly protected in many cases, so the initial access brokers or ransomware affiliates themselves may run successful brute-force attacks against them to gain access to valid accounts.
OS credential dumping (T1003)
Another very common technique is credential dumping. Despite the fact it's easily detectable, ransomware affiliates still use...