{"id":3693,"date":"2020-03-11T10:02:18","date_gmt":"2020-03-11T09:02:18","guid":{"rendered":"https:\/\/werle.pro\/?p=3693"},"modified":"2020-03-11T12:25:17","modified_gmt":"2020-03-11T11:25:17","slug":"ssi-exp-res-pdt-microsoft-shares-tactics-used-in-human-operated-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2020\/03\/11\/ssi-exp-res-pdt-microsoft-shares-tactics-used-in-human-operated-ransomware-attacks\/","title":{"rendered":"SSI EXP RES PDT &#8211; Microsoft Shares Tactics Used in Human-Operated Ransomware Attacks"},"content":{"rendered":"<h3>Defense measures against human-operated ransomware attacks<\/h3>\n<p>Microsoft advises security teams and admins at organizations that<br \/>\nmight be targeted in the future by this type of ransomware campaigns to take defensive measures designed to bock common attack techniques or at<br \/>\nleast dramatically reduce their effectiveness.<\/p>\n<p>The Microsoft Defender Advanced Threat Protection (ATP) Research Team recommends implementing these <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mitigation measures against human-operated ransomware attacks<\/a>:<\/p>\n<div><strong>\u2022 Harden internet-facing assets:<\/strong><\/p>\n<p>&#8211; Apply latest security updates<\/p>\n<p>&#8211; Use threat and vulnerability management<\/p>\n<p>&#8211; Perform regular audit remove privileged credentials<\/p>\n<p><strong>\u2022 Thoroughly investigate and remediate alerts:<\/strong><\/p>\n<p>&#8211; Prioritize and treat commodity malware infections as potential full compromise<\/p>\n<p><strong>\u2022 Include IT Pros in security discussions:<\/strong><\/p>\n<p>&#8211; Ensure collaboration among SecOps, SecAdmins, and IT admins to configure servers and other endpoints securely<\/p>\n<p><strong>\u2022 Build credential hygiene:<\/strong><\/p>\n<p>&#8211; Use MFA or NLA, and use strong, randomized, just-in-time local admin passwords<\/p>\n<p>&#8211; Apply principle of least-privilege<\/p>\n<p><strong>\u2022 Monitor for adversarial activities:<\/strong><\/p>\n<p>&#8211; Hunt for brute force attempts<\/p>\n<p>&#8211; Monitor for cleanup of Event logs<\/p>\n<p>&#8211; Analyze logon events<\/p>\n<p><strong>\u2022 Harden infrastructure:<\/strong><\/p>\n<p>&#8211; Use Windows Defender Firewall<\/p>\n<p>&#8211; Enable tamper protection<\/p>\n<p>&#8211; Enable cloud-delivered protection<\/p>\n<p>&#8211; Turn on attack surface reduction rules and AMSI for Office VBA<\/p><\/div>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-shares-tactics-used-in-human-operated-ransomware-attacks\/\">https:\/\/www.bleepingcomputer.com\/news\/security\/microsoft-shares-tactics-used-in-human-operated-ransomware-attacks\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Defense measures against human-operated ransomware attacks Microsoft advises security teams and admins at organizations that might be targeted in the future by this type of ransomware campaigns to take defensive measures designed to bock common attack techniques or at least dramatically reduce their effectiveness. The Microsoft Defender Advanced Threat Protection (ATP) Research Team recommends implementing &#8230; <a title=\"SSI EXP RES PDT &#8211; Microsoft Shares Tactics Used in Human-Operated Ransomware Attacks\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2020\/03\/11\/ssi-exp-res-pdt-microsoft-shares-tactics-used-in-human-operated-ransomware-attacks\/\" aria-label=\"Read more about SSI EXP RES PDT &#8211; Microsoft Shares Tactics Used in Human-Operated Ransomware Attacks\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-Xz","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3693"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3693"}],"version-history":[{"count":1,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3693\/revisions"}],"predecessor-version":[{"id":3694,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3693\/revisions\/3694"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}