Загрузка страницы

Hunting Human Operated Ransomware Operators | 2020 Threat Hunting & Incident Response Summit

The real threat of ransomware these days lies in "Human Operated Ransomware" attacks, in which we see the deployment of ransomware move to secondary or tertiary objectives. The human operators often focus on enumerating the internal environment in preparation of data exfiltration. By the time the ransomware is deployed, the threat actors have already carried out their initial objectives (and stolen your data!). This talk focuses on finding these operators while they are in your network. Find the operators == stop the ransomware deployment.

Speaker: Ryan Chapman, @rj_chap, Principal Incident Response Analyst, Blackberry; Instructor, SANS Institute

Видео Hunting Human Operated Ransomware Operators | 2020 Threat Hunting & Incident Response Summit канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
24 октября 2020 г. 11:30:00
00:27:14
Другие видео канала
Investigating WMI AttacksInvestigating WMI AttacksSTAR Webcast:  Threat Hunting and the Rise of Targeted eCrime IntrusionsSTAR Webcast: Threat Hunting and the Rise of Targeted eCrime IntrusionsDistributed Evidence Collection and Analysis with Velociraptor - SANS DFIR Summit 2019Distributed Evidence Collection and Analysis with Velociraptor - SANS DFIR Summit 2019SaaS Hunting | 2020 Threat Hunting & Incident Response SummitSaaS Hunting | 2020 Threat Hunting & Incident Response SummitCTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily HackerCTI Summit Keynote - Cliff Stoll - (Still) Stalking the Wily HackerDiscover the secrets of a SOC and how to build a Threat Hunting teamDiscover the secrets of a SOC and how to build a Threat Hunting teamHunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018What Does my SOC Do?: A Framework for Defining an InfoSec Ops Strategy - SANS DFIR Summit 2016What Does my SOC Do?: A Framework for Defining an InfoSec Ops Strategy - SANS DFIR Summit 2016SANS DFIR Webcast - APT Attacks Exposed: Network, Host, Memory, and Malware AnalysisSANS DFIR Webcast - APT Attacks Exposed: Network, Host, Memory, and Malware AnalysisIncident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017Incident Response in the Cloud (AWS) - SANS Digital Forensics & Incident Response Summit 2017Threat Hunting via DNS | SANS@MIC TalkThreat Hunting via DNS | SANS@MIC TalkThreat Hunting and the Rise of Targeted eCrime Intrusions | STAR WebcastThreat Hunting and the Rise of Targeted eCrime Intrusions | STAR WebcastHow to Get Promoted: Developing Metrics to Show How Threat Intel Works - SANS CTI Summit 2019How to Get Promoted: Developing Metrics to Show How Threat Intel Works - SANS CTI Summit 20195 Ways Zeek/Bro Gives You Better Data for Incident Response and Threat Hunting5 Ways Zeek/Bro Gives You Better Data for Incident Response and Threat HuntingDigital Forensics Truths That Turn Out To Be Wrong - SANS DFIR Summit 2018Digital Forensics Truths That Turn Out To Be Wrong - SANS DFIR Summit 2018Kolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat HuntingKolide & OSQuery: How to Build Solid Queries and Packs for Detection and Threat HuntingHow to Use and Create Threat Intelligence in an Office 365 World - SANS CTI Summit 2019How to Use and Create Threat Intelligence in an Office 365 World - SANS CTI Summit 2019The SOC Puzzle: Where Does Threat Hunting Fit? | 2020 Threat Hunting & Incident Response SummitThe SOC Puzzle: Where Does Threat Hunting Fit? | 2020 Threat Hunting & Incident Response SummitKansa for Enterprise scale Threat Hunting w/ Jon Ketchum - SANS DFIR Summit 2020Kansa for Enterprise scale Threat Hunting w/ Jon Ketchum - SANS DFIR Summit 2020The Mind of a Hunter: A Cognitive, Data-Driven Approach - SANS Threat Hunting Summit 2017The Mind of a Hunter: A Cognitive, Data-Driven Approach - SANS Threat Hunting Summit 2017
Яндекс.Метрика