Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
Google Threat Intelligence Group
Google Threat Intelligence
Visibility and context on the threats that matter most.
Contact Us & Get a DemoWritten by: Bavi Sadayappan, Zach Riddle, Ioana Teaca, Kimberly Goody, Genevieve Stark
Introduction
Since 2018, when many financially motivated threat actors began shi...
In SKEPTICAL MODE:
1. STEELMAN — The analysis presents a thorough examination of multiple ransomware strains, identifying shared characteristics and potential connections between them. The authors give due credit to contributing parties and provide valuable insights into the code structure, infection methods, and possible attackers behind these malware samples.
Patterns detected: none
2. ROOT CAUSE — The analysis does not explicitly state a paradigm driving the narrative, but it can be inferred ...
