In the tumultuous landscape of cybersecurity, the yr 2023 left an indelible mark with the brazen exploits of the Scattered Spider risk group. Their assaults targeted the nerve centers of important fiscal and insurance policy establishments, culminating in what stands as one particular of the most impactful ransomware assaults in latest memory.
When corporations have no response plan in place for such an attack, it can become mind-boggling making an attempt to prioritize the future techniques that will have a compounding influence on the danger actor’s capability to keep entry to and manage around a compromised network.
Silverfort’s danger investigate staff interacted carefully with the id threats made use of by Scattered Spider. and in simple fact, created a response playbook in serious time to respond to an lively Scattered Spider attack. This webinar will dissect the serious-lifestyle situation in which they were being referred to as upon to create and execute a reaction plan though attackers were moving inside an organization’s hybrid atmosphere.
Listen to instantly from the Silverfort team about the challenges they faced, together with how to rapidly and proficiently (and in as automated a method as attainable) meet up with the pursuing response plans:
- Set ‘roadblocks’ right away in spot to guard in opposition to additional lateral movement from that place ahead
- Pinpoint person accounts that ended up compromised, with a unique emphasis on company accounts (a favored Scattered Spider goal)
- Eradicate possible malicious existence from the org’s identity infrastructure (once again – a favorable and publicly documented Scattered Spider method)
Also, you can gain insights into the techniques taken in response, concentrating on a few proportions of lateral motion:
- Consumer Accounts – We’ll look at the desired policies and checking for company accounts, admin consumers, and domain buyers
- Id Infrastructure – We are going to focus on limiting person entry, disabling insecure authentication protocols, and even more harden authentication prerequisites
- Other Domain-Joined Machines – We are going to appear at restricting inter-device interaction for user’s workstations, quickly blocking insecure authentication protocols
.webi-a-box{ track record-colour: #f6f7fd padding: 25px border-radius: 10px } .webi-a-box h2 { color: #333 margin-best: } .webi-a-box .cta-button { display: inline-block margin-prime: 20px padding: 10px 20px qualifications-color: #4469f5 coloration: #ffffff !significant border-radius: 5px textual content-decoration: none transition: background-shade .3s ease }
Hear firsthand from Silverfort’s specialists in our upcoming webinar. Restricted places accessible – safe yours now.
Reserve Your Webinar Place ➜
See you there!
Observed this posting attention-grabbing? This report is a contributed piece from a single of our valued associates. Comply with us on Twitter and LinkedIn to browse a lot more exceptional content we submit.
Some parts of this article are sourced from:
thehackernews.com