2020 came with many challenges, least of which was the emergence of more aggressive ransomware tactics — doubling down on extortion via encryption and exfil, new vectors (ESXi), and the adaptation of deployment techniques. This talk will give a fast-paced walk through of how to contain the attack, find evil, and bring critical business infrastructure back up as a rapid responder.
While this talk focuses on attack techniques seen in ransomware, it is important to note similar techniques are seen utilized by other malicious actors, including nation state APT’s.
The end goal of this talk is to provide immediate take-aways for listeners, both for security posture strengthening and additions to current response run books based on the latest mutations of e-crime adversaries.