Analysis on legit tools abused in human-operated ransomware
SANS Ransomware Summit 2023
Analysis on legit tools abused in human-operated ransomware
Speakers:
Toru Yamashige, Senior Incident Response Consultant, Trend Micro Inc.
Keisuke Tanaka, Principal Incident Response Consultant, Trend Micro Inc.
As the detection logics of AV vendors improve, threat actors employ countermeasures to evade them. One of the most common ways in which threat actors hide from detection and carry out their malicious activities is by abusing legitimate tools. We believe that “legitimate tools“ can be classified into three categories below, with a marked increase in the number of cases in which “commercial tools“ are being abused: - MS native tools, such as PsExec, PowerShell, and WMI. - Legitimate penetration testing tools, including Cobalt Strike, Metasploit, and Mimikatz. - Commercial tools, such as Atera, AnyDesk, and Splashtop. Regarding MS native tools, techniques such as LOLBAS and LOLBIN are well-researched, while AV vendors are making efforts to detect penetration testing tools. We feel that threat actors are likely to abuse commercial tools these days as the tools are highly functional and commonly used in corporate operations. There is, however, little research on the exact functionalities of these tools, the traces they leave behind when abused, and countermeasures to prevent such abuse. Therefor, in this presentation, we will focus on actual incident cases where commercial tools were abused and try to explain the details based on the following three points: Chapter 1: Introducing actual incident response cases we have supported in which commercial tools were abused and describing their functionalities. Chapter 2: Explaining the traces and artifacts left behind when the tools are abused in an attack, so that the audience can use this information in their actual incident response investigations. Chapter 3: Describing effective countermeasures against attacks that exploit the tool, which will be useful for containment during incident response and for considerations during normal operations.
View upcoming Summits:
1 view
161
34
24 minutes ago 00:00:00 1
LIVE | U.S.’ THAAD ’Intercepts’ Houthi Missile For 1st Time As Israel Fights 10th Attack From Yemen
1 day ago 00:08:02 1
Krystal and Saagar: MSNBC ENRICHES Never Trump Grifters, Mary Trump Book Sales EXPLODE
1 day ago 00:05:52 1
Bot Trading : Is CoinTech2U the Key to Financial Freedom?
1 day ago 00:06:02 1
Best Forex Broker : PU Prime Review for 2024!
2 days ago 00:06:32 1
Best Forex Indicator : Why SmartCharts is a Game Changer in 2025!
2 days ago 00:05:34 1
Crypto Trading for Beginners & Top Forex Trading Signals to Maximize Your Profits!
2 days ago 00:03:27 1
Azerbaijan Airlines Crash in Kazakhstan Sparks Conspiracy Theories about Russian Air Defense Attack
3 weeks ago 00:08:14 1
GTA 6 TRAILER 2 Is Coming To PlayStation Event By BRUTE FORCE
4 weeks ago 00:03:13 1
AI Trading Bot: Can CoinTech2U Really Make Profits? Find Out!
4 weeks ago 00:12:30 1
Charas: The World’s First Full-Spectrum Concentrate
4 weeks ago 00:04:17 1
On Cam: Russian Jets Pound ‘West-Backed’ Rebels In Syria As Putin Comes To Rescue ‘Anti-Israel’ Ally
1 month ago 00:03:47 1
Central Israel Under Attack: Missiles Pummel Tel Aviv Suburbs; Hezbollah Bombs North | Watch
1 month ago 00:08:10 1
AI Agents Will Create MILLIONAIRES in 2025 – Are You Ready
1 month ago 00:08:38 1
Retired General on How Ukraine Is ‘Bleeding Out’ Against Russia | WSJ