Category | Details |
---|---|
Threat Actors | Ransomware and extortion groups, including lucrative intrusion sets and state-sponsored actors. |
Campaign Overview | Focus on data exfiltration to maximize financial and reputational impact, often leveraging double extortion. |
Target Regions (Or Victims) | Organizations with high-value, sensitive data such as financial, personal, medical records, classified documents, and IT/network data. |
Methodology | Double extortion by stealing and threatening to leak sensitive data; exfiltration without encryption is growing. |
Product Targeted | Sensitive files including financial records, personal data, medical records, and IT/network information. |
Malware Reference | Infostealers, Remote Access Trojans (RATs), spyware, backdoors, MaaS tools, and commodity malware. |
Tools Used | Combination of custom tools (for stealth and efficiency) and publicly available tools for enumeration, compression, and uploading. |
Vulnerabilities Exploited | Poor monitoring of data movement, use of legitimate tools to blend with normal operations, and lack of robust detection strategies. |
TTPs | Pre-qualification of data, strategic targeting of high-value files, use of stealthy exfiltration methods, and blending with legitimate activities. |
Attribution | Both financially motivated groups and state-sponsored actors, sometimes to misdirect attribution. |
Recommendations | Early detection via monitoring suspicious behavior, focusing on critical files and directories, and identifying known exfiltration tools. |
Source | Sekoia Blog |
Read full article: https://blog.sekoia.io/ransomware-driven-data-exfiltration-techniques-and-implications/
Disclaimer: The above summary has been generated by an AI language model
Leave a Reply