The Unified Ransomware Kill Chain
Throughout this book we have consumed quite a lot of cyber threat intelligence related to ransomware attacks, as well as looked at the most common techniques used by threat actors from a forensic perspective, so we have a good understanding of human-operated ransomware attacks and are ready to build a unique kill chain.
Gain Access to the Network
Ransomware affiliates may gain access to the target network themselves or purchase such access from the initial access brokers. Access may be granted to a certain host in the network, or to the network itself, for example, via compromised VPN credentials.
Ransomware affiliates may employ a wide range of techniques to gain access, from quite common techniques, such as brute-force attacks and phishing emails, to more advanced techniques, such as supply chain attacks.
Establish Foothold
This stage may include various activities. Ransomware affiliates may need to collect information about the compromised...