2024 SANS Ransomware Summit - JoeyTaubert/Cyber-Summits-Conferences-Talks GitHub Wiki

Ransomware Diaries

Disarm Kill Chain

Makes you think about other aspects of the attack, makes it difficult to miss something

image

Data collection

image

💡 Ransomware groups always need to talk to their victims

Attack Data

Need to gather all logs/evidence with respect to:

  • Time of activity
  • Phishing emails details
  • IoCs
  • other essential telemetry details

Darknet Forums

First thing to do is to figure out where the attackers "live".

  • What forums do they use?
    • Identify
    • Gain access

Then, identify the accounts of the target. Also, who do they talk to?

Finally, we can collect forum content.

  • Go through all their posts

Attacker Infrastructure

Attackers have their own infrastructure.

💡 Jon once attempted to join LockBit as an affiliate. While he wasn't able to become one, he learned alot about their organization.

Threat Actor Engagement

Know their

  • Politics
  • Religious Beliefs
  • What they like outside of ransomware
  • Opinions on relevant/associated criminals

Ransomware Life Cycle - Syed Zaidi

image

Atomic Ransomware Emulation - Gerard Johanson

image

  • Technique - Focus on a single TTP
    • Can we detect the technique
    • Can we find indications from artifacts
    • Drills