“how the huntress soc stopped a vpn - based ransomware attack we resolve thousands of alerts every single month in our security operations center ( soc ). and, sure, we could throw out fancy numbers, but what does that really solve? big numbers tend to blur the lines until they ’ …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
72%
“. this means they ’ re leaving the front door unlocked for attackers to stroll in whenever they want. in this case, our soc was initially tipped off when the customer ’ s managed endpoint detection and response ( edr ) started firing off warning signs for potentially shady activi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
70%
“). what you can do if you ’ re running a small business or managing it for one, take a hard look at your defenses. - do you have 2fa on your vpn? ( seriously, go check right now. ) - do you know if rdp is exposed to the internet? - do you have access to a team that can review ale…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1195Supply Chain Compromise
66%
“means targeting organizations that play critical roles in local economies and supply chains. - a single vulnerable entry point can lead to a full - blown ransomware attack. in this case, a compromised vpn without multi - factor authentication ( mfa ) triggered tactics like stolen…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
58%
“fired, losing the company ’ s sensitive data, or not being able to recover at all. soc support was on the phone with the customer, offering reassurance and explaining what was actually happening. this is crucial in helping victims pivot from panic to action under extremely stress…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1078Valid Accounts
58%
“local economy. when businesses like this go down, it ’ s not just their employees who suffer. it ’ s every downstream project waiting for its output and products. it ’ s the local vendors, partners, and even nearby food joints that rely on their business. when businesses like thi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1021.001Remote Desktop Protocol
43%
“. this means they ’ re leaving the front door unlocked for attackers to stroll in whenever they want. in this case, our soc was initially tipped off when the customer ’ s managed endpoint detection and response ( edr ) started firing off warning signs for potentially shady activi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1003OS Credential Dumping
36%
“. this means they ’ re leaving the front door unlocked for attackers to stroll in whenever they want. in this case, our soc was initially tipped off when the customer ’ s managed endpoint detection and response ( edr ) started firing off warning signs for potentially shady activi…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1486Data Encrypted for Impact
34%
“means targeting organizations that play critical roles in local economies and supply chains. - a single vulnerable entry point can lead to a full - blown ransomware attack. in this case, a compromised vpn without multi - factor authentication ( mfa ) triggered tactics like stolen…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Get an insider look at how the Huntress SOC stopped an unsecured VPN based ransomware attack. Learn why your business needs more than just software to stay secure.