YoVDO

Match Legitimate Name or Location and Data Encrypted for Impact

Offered By: Cybrary

Tags

Mitre Att&ck Framework Courses Cybersecurity Courses Data Encryption Courses Threat Detection Courses

Course Description

Overview

After an adversary takes the time to gain access to an environment they aren’t likely to give up their position by being completely obvious. Adversaries need to evade detection in order to have the time to find the information they’re really after. One technique to accomplish this is by hiding in plain sight. Adversaries may name their malicious payloads similarly to system files or commonly installed programs. They’ll even make sure to store these files in similar directories, all in service of avoiding detection.

According to the 2021 Verizon Data Breach Investigations Report (DBIR), ransomware has increased around 10%, making it the third most common type of attack among all breaches. Many now know that an effective backup strategy can mitigate the risk of ransomware, but ransomware gangs aren’t so easily outdone. They have quickly pivoted to exfiltrating the data first then encrypting. This allows them to blackmail organizations with the threat of data disclosure if the ransom isn’t paid. The pace of ransomware certainly isn’t slowing, are you keeping pace?

Get the hands-on skills you need to detect and mitigate this attack in Cybrary's MITRE ATT&CK Framework courses aligned to the tactics and techniques used by financially motivated threat group FIN7. Prevent adversaries from accomplishing the tactics of Defense Evasion and Data Encryption for Impact in your environment now.


Syllabus

  • Match Legitimate Name or Location & Data Encrypted for Impact
    • What is the Match Legitimate Name or Location Technique?
    • What is the Data Encrypted for Impact Technique?
    • Detection, Validation, and Mitigation (Lab)

Related Courses

Windows 10 Features for a Mobile Workforce: Configuring Additional Resources
edX
Computing, Storage and Security with Google Cloud Platform
Google via Coursera
Deep Dive into Amazon Elastic Block Store (EBS)
Amazon via Independent
これだけは知っておきたい公衆無線LANセキュリティ対策 (pt23)
gacco
Security Best Practices in Google Cloud
Google Cloud via Coursera