{"id":123901,"date":"2022-10-18T11:00:00","date_gmt":"2022-10-18T18:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=123901"},"modified":"2023-09-11T16:14:36","modified_gmt":"2023-09-11T23:14:36","slug":"defenders-beware-a-case-for-post-ransomware-investigations","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/10\/18\/defenders-beware-a-case-for-post-ransomware-investigations\/","title":{"rendered":"Defenders beware: A case for post-ransomware investigations"},"content":{"rendered":"\n
Ransomware is one of the most pervasive threats that Microsoft Detection and Response Team (DART) responds to today. The groups behind these attacks continue to add sophistication to their tactics, techniques, and procedures (TTPs) as most network security postures increase.<\/p>\n\n\n\n
In this blog, we detail a recent ransomware incident in which the attacker used a collection of commodity tools and techniques, such as using living-off-the-land binaries, to launch their malicious code. Cobalt Strike was used for persistence on the network with NT AUTHORITY\/SYSTEM (local SYSTEM) privileges to maintain access to the network after password resets of compromised accounts.<\/p>\n\n\n\n
This incident highlights an attacker\u2019s ability to have a longstanding dwell time on a network before deploying ransomware. We will also discuss the various techniques used as well as the recommended detections and defense techniques that customers can use to increase protection against these types of attacks.<\/p>\n\n\n\n
Microsoft recommends hunting proactively for pre-ransomware behaviors and hardening your network to prevent impact. Refer to https:\/\/aka.ms\/ransomware-as-a-service<\/a> for more information about defending against ransomware-related incidents.<\/p>\n\n\n\nWhat we found<\/h2>\n\n\n\n