Raja Azkar Posted 21 Jun 2022 14:09

Security solution

Which step of the ransomware kill chain encrypts files?

tanveer Posted 21 Jun 2022 14:29

Sangfor Solution
Sangfor suggested a combination of Sangfor NGAF, HCI, and Endpoint Secure to harden network security and correlate their incident response capabilities.

Ensure those network security devices are properly deployed and installed to protect against both internal and external threats.

NGAF protects the network perimeter from external threats and attacks
NGAF and SSL-VPN restrict unauthorized users from accessing the internal network
Endpoint Secure protects endpoints from both known and unknown malware and viruses
NGAF URL and application filtering ensures that only authorized URL and applications can be assessed by authorized employees

Case Study of sangfor "success-stories/ransomware-attack-and-recovery-sangfor-indonesia"

tanveer Posted 23 Jun 2022 15:17

Last edited by tanveer 23 Jun 2022 15:27.

If devide Ransomware Kill chain in 3 stages than on 2nd phase encription occured. Many Cyber experts devided in 7 steps than on stage 4 encryption processed.

regidorreyes Posted 29 Jun 2022 09:27

It is between stage 5 to 7.

Faisal P Posted 29 Jun 2022 12:26

The basic kill chain phases of a ransomware attack are: distribution, infection, staging, scanning, encryption, and the big payday

rivsy Posted 29 Jun 2022 14:28

Between stage 2 to 3

Pat Posted 30 Jun 2022 12:03

Stage 7 or Actions on Objectives wherein the hackers are finally taking action to fullfil their purpose, such as encryption of files for ransom, data exfiltration or even data destruction.

jetjetd Posted 01 Jul 2022 02:31

Its STEP 5...
Step 1 - Campaign distributionStep 2 - Infection
Step 3 - StagingStep 4 - Scanning
Step 5 - EncryptionStep 6 - Payday




jsix Posted 01 Jul 2022 10:06

There are 7 Stages of a Ransomware Kill Chain. The encryption of files begins in STAGE 5 - Encryption[/color] , this is where the dreaded process begins.It’s here where your data becomes transformed into its inaccessible form. There are two approaches to the encryption phase. One is to encrypt everything as quickly as possible. The other is a slow burn in which files are encrypted in slow order over time to escape detection.
page: [1]
查看完整版本: Security solution