![]() ![]() Ransomware-deploying threat actors do have a tendency to reuse a lot of the same tools, techniques, and procedures Some ransomware groups have even created playbooks for their affiliates to follow. This threat activity cluster has already borne fruit, linking these attacks to a Cactus ransomware attack reported by Kroll.The threat activity cluster indicates that this secretive group may actually be working with outside affiliates, and may be recruiting elsewhere. The criminals who operate Royal ransomware reputedly don’t publicly solicit affiliates to work with them.Threat activity clusters don’t necessarily include the more common aspects of attacker behavior Rather, these include very narrowly-focused details that are not apparent to anyone other than the target and their defender(s), and would be hard for someone who isn’t the attacker (or who isn’t following a detailed attacker playbook) to replicate.A threat activity cluster isn’t an attribution, but is a stepping stone to making an attribution to who might be behind an attack.Knowing who is doing the attacking while a ransomware attack is taking place, and their usual behavior, can give a defender valuable insight into what the attacker might do next.The attacks we examined targeted disparate businesses and geographies where they operate, and involved different ransomware groups. The Sophos MDR team performed postmortem investigations at the request of the targets. ![]() In the parlance of the Managed Detection and Response (MDR) team, the peculiarly similar details constitute a threat activity cluster that Sophos can track. A collection of very specific behaviors, observed by Sophos X-Ops incident response analysts in the lead-up to four separate ransomware attacks in the first quarter of 2023, indicates an unexpected connection between the attacks. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |