* . *
  • About
  • Advertise
  • Privacy & Policy
  • Contact
Friday, July 25, 2025
Earth-News
  • Home
  • Business
  • Entertainment
    City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

    Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

    Black Box Players presents ‘The Three Musketeers’ – CBS 19 News

    Experience the Adventure: Black Box Players Bring ‘The Three Musketeers’ to Life!

    AP Entertainment SummaryBrief at 1:51 p.m. EDT – Channel 3000

    Entertainment Highlights: Key Updates You Can’t Miss

    ‘Devil Wears Prada 2’ casts Anne Hathaway’s love interest replacing Adrian Grenier’s Nate – Entertainment Weekly

    Devil Wears Prada 2′ Casts New Love Interest for Anne Hathaway, Replacing Adrian Grenier’s Nate

    12 ‘Late Show’ Moments Proving Stephen Colbert Can’t Be Replaced – The Mountaineer

    12 Unforgettable ‘Late Show’ Moments That Prove Stephen Colbert Is Truly One of a Kind

    Canes owner Tom Dundon’s real estate firm eyes entertainment complex near RDU – The Business Journals

    Canes Owner Tom Dundon’s Real Estate Firm Unveils Plans for Thrilling New Entertainment Complex Near RDU

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Behind the Screens: The Impact of Technology on Real Estate – TRREB

    Behind the Screens: How Technology is Transforming the Future of Real Estate

    Sustainserv and Palau Announce Technology Partnership to Leverage Innovative AI Platform to Advance Sustainability Reporting – Business Wire

    Sustainserv and Palau Team Up to Transform Sustainability Reporting with Breakthrough AI Technology

    Morgan Adamski Joins PwC in Newly Created Cyber, Data & Technology Risk Division – HSToday

    Morgan Adamski Leads the Charge in PwC’s Cutting-Edge Cyber, Data & Technology Risk Division

    Transformative technology, support for food entrepreneurs spotlighted – University of Hawaii System

    How Cutting-Edge Technology and Strong Support Are Revolutionizing Food Entrepreneurs’ Success

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
  • Home
  • Business
  • Entertainment
    City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

    Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

    Black Box Players presents ‘The Three Musketeers’ – CBS 19 News

    Experience the Adventure: Black Box Players Bring ‘The Three Musketeers’ to Life!

    AP Entertainment SummaryBrief at 1:51 p.m. EDT – Channel 3000

    Entertainment Highlights: Key Updates You Can’t Miss

    ‘Devil Wears Prada 2’ casts Anne Hathaway’s love interest replacing Adrian Grenier’s Nate – Entertainment Weekly

    Devil Wears Prada 2′ Casts New Love Interest for Anne Hathaway, Replacing Adrian Grenier’s Nate

    12 ‘Late Show’ Moments Proving Stephen Colbert Can’t Be Replaced – The Mountaineer

    12 Unforgettable ‘Late Show’ Moments That Prove Stephen Colbert Is Truly One of a Kind

    Canes owner Tom Dundon’s real estate firm eyes entertainment complex near RDU – The Business Journals

    Canes Owner Tom Dundon’s Real Estate Firm Unveils Plans for Thrilling New Entertainment Complex Near RDU

  • General
  • Health
  • News

    Cracking the Code: Why China’s Economic Challenges Aren’t Shaking Markets, Unlike America’s” – Bloomberg

    Trump’s Narrow Window to Spread the Truth About Harris

    Trump’s Narrow Window to Spread the Truth About Harris

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    Israel-Gaza war live updates: Hamas leader Ismail Haniyeh assassinated in Iran, group says

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    PAP Boss to Niger Delta Youths, Stay Away from the Protest

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Court Restricts Protests In Lagos To Freedom, Peace Park

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Fans React to Jazz Jennings’ Inspiring Weight Loss Journey

    Trending Tags

    • Trump Inauguration
    • United Stated
    • White House
    • Market Stories
    • Election Results
  • Science
  • Sports
  • Technology
    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Google Cloud Announced as a Key Technology Partner for Odoo Connect 2025 in San Francisco – GlobeNewswire

    Behind the Screens: The Impact of Technology on Real Estate – TRREB

    Behind the Screens: How Technology is Transforming the Future of Real Estate

    Sustainserv and Palau Announce Technology Partnership to Leverage Innovative AI Platform to Advance Sustainability Reporting – Business Wire

    Sustainserv and Palau Team Up to Transform Sustainability Reporting with Breakthrough AI Technology

    Morgan Adamski Joins PwC in Newly Created Cyber, Data & Technology Risk Division – HSToday

    Morgan Adamski Leads the Charge in PwC’s Cutting-Edge Cyber, Data & Technology Risk Division

    Transformative technology, support for food entrepreneurs spotlighted – University of Hawaii System

    How Cutting-Edge Technology and Strong Support Are Revolutionizing Food Entrepreneurs’ Success

    Trending Tags

    • Nintendo Switch
    • CES 2017
    • Playstation 4 Pro
    • Mark Zuckerberg
No Result
View All Result
Earth-News
No Result
View All Result
Home Business

A Disturbing Trend in Ransomware Attacks: Legitimate Software Abuse

July 21, 2023
in Business
A Disturbing Trend in Ransomware Attacks: Legitimate Software Abuse
Share on FacebookShare on Twitter

When discussing ransomware groups, too often the focus is on their names, such as Noberus, Royal or AvosLocker, rather than the tactics, techniques, and procedures (TTPs) used in an attack before ransomware is deployed. For example, the particularly heavy use of legitimate software tools in ransomware attack chains has been notable in recent times. In fact, we rarely see a ransomware attack that doesn’t use legitimate software.

Staying Under the Radar: Why Abuse Is Rampant

Ransomware attacks remain a major cybersecurity problem. Ransomware actors, like threat actors in general, are abusing legitimate software for a number of reasons. First is a desire for stealthiness — they’re trying to get into and out of networks as quickly as possible without being discovered. Leveraging legitimate software can allow attackers’ activity to remain hidden, which may allow them to achieve their goals on a victim network without being discovered. Legitimate software misuse also can make attribution of an attack more difficult, and these tools can also lower barriers to entry. This means less-skilled hackers may still be able to conduct quite wide-ranging and disruptive attacks.

The legitimate tools we most commonly see being used by malicious actors are remote monitoring and management (RMM) tools, such as AnyDesk, Atera, TeamViewer, ConnectWise, and more. In fact, the use of RMM software by malicious actors was considered serious enough for the Cybersecurity and Infrastructure Security Agency (CISA) to issue an alert about this kind of. As recently as February this year, the Symantec Threat Hunter team saw ConnectWise used in both Noberus and Royal ransomware attacks. These tools are commonly used legitimately by IT departments in small, midsize, and large organizations.

Rclone, a legitimate tool for managing content in the cloud, was also used in a Noberus attack recently. In this particular case, attackers used Rclone to exfiltrate files because their earlier attempt to exfiltrate data, using their own custom ExMatter tool, had failed because it was blocked by security software.

AdFind, a legitimate free command-line query tool that can be used for gathering information from Active Directory, is also frequently used by ransomware attackers, who use it to map a network. PDQ Deploy, a tool that sysadmins use to apply patches, is also often abused by attackers, who use it to drop scripts onto victim networks quite efficiently. It’s not just legitimate tools that are used for malicious purposes by ransomware actors. For example, multiple state-sponsored groups have used legitimate cloud infrastructure such as Google Drive, Dropbox, OneDrive, and others for command-and-control (C&C) infrastructure and to exfiltrate and store stolen data.

Stay Vigilant

Attacks that leverage legitimate software and infrastructure present a particular challenge for both defenders and organizations. A blunt-instrument approach such as blocking the service or tool doesn’t work in these kinds of cases.

And this problem isn’t going away. With every new technology, bad actors will find a way to use it for their own nefarious purposes. For example, a few years ago the cloud wasn’t necessarily a big feature in many organizations. Now, obviously, as more data is moving to the cloud, the infrastructure itself is being used for malicious means, and legitimate tools for use in the cloud, such as Rclone, are being misused by attackers.

To reduce the risk of misuse of legitimate software, organizations should take the following steps:

Improve visibility: The old approach of simply detecting, blocking, and deleting malicious files is no longer sufficient to protect your organization in a cyber-threat landscape where legitimate tools, dual-use tools, and legitimate infrastructure are increasingly being used by malicious actors. Organizations need to have a comprehensive view of their network — they need to know what software is installed on their networks. If unauthorized legitimate tools are found, treat that discovery with the highest priority.

Implement least privilege: User permissions should be kept to a minimal level, without impacting user experience, so that if an attacker gains access to a machine or account, it doesn’t mean they can necessarily spread widely across the network, or that they can access everything that’s on the computer, or the network.

Go beyond malware detection: Since bad actors are often leveraging legitimate software, it’s important that organizations use a security solution that can detect and analyze suspicious behavior — and stop it. Vigilance within an organization is also key. You need to build a culture of security at your organization so that everyone is on the lookout for any kind of suspect behavior that might occur.

To read more from the Threat Hunter team at Broadcom go here: https://symantec-enterprise-blogs.security.com/blogs/

About Brigid O’Gorman:

O’Gorman

Brigid O’Gorman is a Senior Intelligence Analyst on the Symantec Enterprise Threat Hunter Team, part of Broadcom. She works with other security experts within Symantec to investigate targeted attacks, ransomware and other cybercrime. The team drives enhanced protection in Symantec products, and offers analysis and insights to help customers and more respond to malicious attacks.

>>> Read full article>>>
Copyright for syndicated content belongs to the linked Source : CIO – https://www.cio.com/article/645393/a-disturbing-trend-in-ransomware-attacks-legitimate-software-abuse.html

Tags: businessDisturbingTrend
Previous Post

How SAP changed Carl Zeiss AG’s view of optical product manufacturing

Next Post

Banking on customer experience and security via technology-based innovation

When can we detect lianas from space? Toward a mechanistic understanding of liana-infested forest optics – ESA Journals

Unveiling Forest Canopies: How Satellite Technology Detects Lianas from Space

July 25, 2025
China launches world’s first robot that can run by itself 24/7 — watch it change its own batteries in unsettling new footage – Live Science

China launches world’s first robot that can run by itself 24/7 — watch it change its own batteries in unsettling new footage – Live Science

July 25, 2025
Enjoy Indoor Summer Fun at This Science Center in Rye, New Hampshire – Only In Your State

Discover Exciting Indoor Summer Adventures at This Science Center in Rye, New Hampshire

July 25, 2025
Superhero Lifestyle Collections – Trend Hunter

Discover the Ultimate Superhero Lifestyle Collections Transforming Everyday Living

July 25, 2025
How to watch Katie Ledecky at the 2025 World Swimming Championships – NBC Sports

Don’t Miss a Second: How to Watch Katie Ledecky Shine at the 2025 World Swimming Championships

July 25, 2025
Space Foundation Study: Space economy worth $600bn+ – news.satnews.com

Space Foundation Study: Space economy worth $600bn+ – news.satnews.com

July 25, 2025
City of Pelham announces entertainment district plans for former Oak Mountain Amphitheatre site – WVTM

Pelham Unveils Exciting New Entertainment District Plans for Former Oak Mountain Amphitheatre Site

July 25, 2025
Advocates talk benefits of single-payer health care in Greenfield forum – Athol Daily News

Advocates Highlight the Benefits of Single-Payer Health Care at Greenfield Forum

July 25, 2025
Trump’s Name Is on Contributor List for Epstein Birthday Book – The New York Times

Trump’s Name Emerges in Contributor List for Epstein’s Birthday Book

July 25, 2025
WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

WhoFi: New surveillance technology can track people by how they disrupt Wi-Fi signals – Tech Xplore

July 25, 2025

Categories

Archives

July 2025
MTWTFSS
 123456
78910111213
14151617181920
21222324252627
28293031 
« Jun    
Earth-News.info

The Earth News is an independent English-language daily published Website from all around the World News

Browse by Category

  • Business (20,132)
  • Ecology (738)
  • Economy (762)
  • Entertainment (21,643)
  • General (16,100)
  • Health (9,800)
  • Lifestyle (770)
  • News (22,149)
  • People (764)
  • Politics (771)
  • Science (15,977)
  • Sports (21,259)
  • Technology (15,744)
  • World (745)

Recent News

When can we detect lianas from space? Toward a mechanistic understanding of liana-infested forest optics – ESA Journals

Unveiling Forest Canopies: How Satellite Technology Detects Lianas from Space

July 25, 2025
China launches world’s first robot that can run by itself 24/7 — watch it change its own batteries in unsettling new footage – Live Science

China launches world’s first robot that can run by itself 24/7 — watch it change its own batteries in unsettling new footage – Live Science

July 25, 2025
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

No Result
View All Result

© 2023 earth-news.info

Go to mobile version