Ransomware attack scenario review

Tuesday
 
26
 
November
3:50 pm
 - 
4:30 pm

Speakers

Chris Thomas

Chris Thomas

Senior Security Advisor
ExtraHop

Synopsis

If your strategy for preventing ransomware attacks is solely to block the executable, you're doing it wrong. Join this session to review and dissect a real world Ransomware attack and learn what the early stages of an attack look like - and how to detect them with network visibility.

This session provides a step-by-step reconstruction of a real-world ransomware attack and shows detection opportunities using network visibility before ransomware execution takes place. The attack is based on a DFIR report of a real-world ransomware attack using IcedID to drop Nokoyawa ransomware. All host-specific steps were removed in order to focus on network observable steps of this attack.

For each stage of the attack the session highlights in-production detections from a Network Detection and Response (NDR) solution that would fire and detect the behaviour - giving defenders an early indicator of attack behaviour that they can use to thwart the attacker's efforts. The session also shows attendees that are not familiar with NDR tools the type of detections that they are capable of to help with earlier detection of attacks that are in progress with over 15 real world examples of detections based on this single attack use case.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country