{"id":116382,"date":"2022-06-21T09:00:00","date_gmt":"2022-06-21T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=116382"},"modified":"2023-08-03T15:25:29","modified_gmt":"2023-08-03T22:25:29","slug":"improving-ai-based-defenses-to-disrupt-human-operated-ransomware","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/06\/21\/improving-ai-based-defenses-to-disrupt-human-operated-ransomware\/","title":{"rendered":"Improving AI-based defenses to disrupt human-operated ransomware"},"content":{"rendered":"\n

Microsoft\u2019s deep understanding of human-operated ransomware attacks, which are powered by a thriving cybercrime gig economy<\/a>, continuously informs the solutions we deliver to protect customers. Our expert monitoring of threat actors, investigations into real-world ransomware attacks, and the intelligence we gather from the trillions of signals that the Microsoft cloud processes every day provide a unique insight into these threats. For example, we track human-operated ransomware attacks not only as distinct ransomware payloads, but more importantly, as a series of malicious activities that culminate in the deployment of ransomware. Detecting and stopping ransomware attacks as early as possible is critical for limiting the impact of these attacks on target organizations, including business interruption and extortion.<\/p>\n\n\n\n

To disrupt human-operated ransomware attacks as early as possible, we enhanced the AI-based protections in Microsoft Defender for Endpoint with a range of specialized machine learning techniques that find and swiftly incriminate \u2013 that is, determine malicious intent with high confidence \u2013 malicious files, processes, or behavior observed during active attacks.<\/p>\n\n\n\n

The early incrimination of entities \u2013 files, user accounts, and devices \u2013 represents a sophisticated mitigation approach that requires an examination of both the attack context as well as related events on either the targeted device or within the organization. Defender for Endpoint combines three tiers of AI-informed inputs, each of which generates a risk score, to determine whether an entity is associated with an active ransomware attack:<\/p>\n\n\n\n