{"id":138286,"date":"2025-04-09T09:00:00","date_gmt":"2025-04-09T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=138286"},"modified":"2025-04-15T16:17:50","modified_gmt":"2025-04-15T23:17:50","slug":"how-cyberattackers-exploit-domain-controllers-using-ransomware","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/04\/09\/how-cyberattackers-exploit-domain-controllers-using-ransomware\/","title":{"rendered":"How cyberattackers exploit domain controllers using ransomware"},"content":{"rendered":"\n

In recent years, human-operated cyberattacks have undergone a dramatic transformation. These attacks, once characterized by sporadic and opportunistic attacks, have evolved into highly sophisticated, targeted campaigns aimed at causing maximum damage to organizations, with the average cost of a ransomware attack reaching $9.36 million in 2024.1<\/sup> A key catalyst to this evolution is the rise of ransomware as a primary tool for financial extortion\u2014an approach that hinges on crippling an organization\u2019s operations by encrypting critical data and demanding a ransom for its release. Microsoft Defender for Endpoint<\/a> disrupts ransomware attacks in an average of three minutes, only kicking in when more than 99.99% confident in the presence of a cyberattack.<\/p>\n\n\n\n

\n
Disrupt ransomware with Microsoft Defender for Endpoint<\/a><\/div>\n<\/div>\n\n\n\n

The evolution of ransomware attacks<\/h2>\n\n\n
\n\t
\n\t\t

\n\t\t\tWhat is ransomware?\t\t<\/p>\n\t\t\n\t\t\tLearn more<\/span> <\/span>\n\t\t<\/a>\n\t<\/div>\n<\/div>\n\n\n\n

Modern ransomware campaigns are meticulously planned. Cyberattackers understand that their chances of securing a ransom increase significantly if they can inflict widespread damage across a victim\u2019s environment. The rationale is simple: paying the ransom becomes the most viable option when the alternative\u2014restoring the environment and recovering data\u2014is technically unfeasible, time-consuming, and costly. <\/p>\n\n\n\n

This level of damage happens in minutes and even seconds, where bad actors embed themselves within an organization\u2019s environment, laying the groundwork for a coordinated cyberattack that can encrypt dozens, hundreds, or even thousands of devices within minutes<\/strong>. To execute such a campaign, threat actors must overcome several challenges such as evading protection, mapping the network, maintaining their code execution ability, and preserving persistency in the environment, building their way to securing two major prerequisites<\/strong> necessary to execute ransomware on multiple devices simultaneously:<\/p>\n\n\n\n