WastedLocker Goes “Big-Game Hunting” in 2020

By Ben Baker, Edmund Brumaghin, JJ Cummings and Arnaud Zobec.

Threat summary
After initially compromising corporate networks, the attacker behind WastedLocker performs privilege escalation and lateral movement prior to activating ransomware and demanding ransom payment.The use of “dual-use” tools and “LoLBins” enables adversaries to evade detection and stay under the radar as they further operate towards their objectives in corporate environments.WastedLocker is one of the latest examples of…

[[ This is only the beginning! Please visit the blog for the complete entry ]]

Go to Source
Author:

You may also like...