Attivo Networks Blogs

Ransomware

Secure Your Shared Resources from Adversaries Exploiting SMB and Windows Admin Shares

Reading Time: 3 minutes  |  Published: January 29, 2021 in Blogs, Ransomware
0 Comments

Vikram Navali, Senior Technical Product Manager  - The tactics employed by adversaries are as varied as their motives. Some prefer spear-phishing, while others make use of malware, executing targeted attacks. However, the result is inevitably the same: getting unprivileged access to shared resources like files, folders,...

Microsoft Active Directory as a Prime Target for Ransomware Operators

Reading Time: 4 minutes  |  Published: December 9, 2020 in Active Directory, Ransomware
0 Comments

Written by: Joseph Salazar, Technical Marketing Manager & Juan Carlos Vázquez, Sales Manager -The Active Directory (AD) infrastructure remains critical in so-called “human-operated” ransomware campaigns and post-compromise extortion, which represents a significant threat to businesses and a detection challenge in the short time they have...

Combatting Triton Malware with Advanced Threat Detection

Reading Time: 2 minutes  |  Published: May 10, 2019 in Blogs, Ransomware
1 Comment

Written by: Mike Parkin, Technical Marketing Engineer - Malware targeting IoT devices is nothing new.  There have been some reasonably famous, or infamous, depending on your perspective, IoT targeted malware incidents.  An April article on ZDNetby Danny Palmer, on the Triton malware attack in late...

cybersecurity halloween

What Could be Coming to Haunt Your Organization this Halloween

Reading Time: 5 minutes  |  Published: October 31, 2018 in Blogs, Deception, Energy, Event, Government, Healthcare, High Tech, IoT, Ransomware, Threat Detection, ThreatDefend
0 Comments

Written by: Carolyn Crandall, Attivo Networks CMO - Halloween may be the only time of the year when monsters, vampires and ghosts parade the streets at night spooking the public. However, in the dark online world of sophisticated adversaries and expanding attack surfaces, threats continue to...

Petya… Echoes of WannaCry

Reading Time: 2 minutes  |  Published: June 28, 2017 in Blogs, Ransomware, ThreatDefend
0 Comments

Does this sound familiar?  On June 27, news outlets began reporting on a ransomware attack that was spreading like wildfire, hitting over 300,000 devices across over 150 countries and counting.  The attack utilized the EternalBlue exploit that was stolen from the NSA and released by...

Remote Office Solutions

New Entries Into The Ransomware Worm Family Detected That Could Prove More Dangerous Than WannaCry

Reading Time: 4 minutes  |  Published: May 31, 2017 in Blogs, Ransomware
0 Comments

Immediately following the WannaCry attack, CISOs started to examine ways they could improve their ransomware defenses (we described the deception solution in our recent blog Deception Derails Ransomware: WannaCry Analyzed by Attivo Labs.)Following the initial attacks, TrendMicro has seen three new entries, UIWIX, Adylkuzz and...