All episodes
-
The Ransomware Attacker's Cookbook: Examining Conti’s Leaked Documentation
Eliad Kimhy, Head of Akamai Security Research CORE, and Dan Petrillo, Product Marketing, Director
The Ransomware Attacker's Cookbook: Examining Conti’s Leaked Documentation to Better Enable Ransomware Defense
In recent years, ransomware has become ubiquitous with cybersecurity attacks, costing more than US $20 billion globally in damages in 2021. The advent of high-profile ransomware attacks, starting with 2017’s WannaCry global attack, has significantly elevated ransomware awareness. Recent years have seen ransomware attackers strike at schools, government, healthcare, and infrastructure, among other targets.
A recent leak of documents from Conti, one of the world’s most prolific RaaS providers, revealed some of its inner workings, providing researchers and reporters with insight into how these organizations operate. We dove deeply into the attacks Conti publicly reported on their leak site to gain insights on the verticals that were most impacted, the revenue range distribution by attack, and countries that were most heavily affected.
Join Akamai threat researchers that have been analyzing and researching RaaS providers to reveal some of the underlying mechanisms that have contributed to their success and some of the results that provide a thorough reporting of attack trends, tools, and the mitigation that must follow, which include:
- Monitoring and blocking of tactics, techniques, and procedures (TTPs) used in lateral movement
- Separating the network into operational segments — by application, usage, or environment and not allowing unnecessary connections between and within those segments.
- Using segmentation and ring fencing on critical data services and limiting access to them to reduce the risk factor against those services. -
Reducing the Likelihood, Impact and MTTR of Ransomware with One Tool
Dan Petrillo - Product Marketing Director & Jason Aguiar - Senior Sales Engineer, Global Accounts
The debate of prevention vs. response is a tired one in cybersecurity. Both sides have valid (if cliché) points. Yes … an ounce of prevention is worth a pound of cure. And yes… breaches are inevitable, so we must be capable of a timely response. In the rapidly changing digital landscape, organizations are constantly seeking tools that can seamlessly bridge this gap.
Enter microsegmentation — a transformative approach.
Its innate ability to ward off threats, coupled with the agility to swiftly manage and mitigate breaches, makes it an invaluable asset in any cybersecurity toolkit. As threats grow in complexity and scale, understanding and leveraging the multifaceted capabilities of microsegmentation becomes not just advantageous, but essential.
During our data breach webinar, you will:
- Discover microsegmentation’s dual role: deterring breaches and enabling rapid countermeasures
- See how this tool minimizes attack fallout, strengthening your defense posture
- Leverage advanced techniques and tactics to minimize MTTR during cyber events
- Grasp the essence of containment, allowing teams to swiftly neutralize threats while ensuring operational continuity -
Ransomware Mitigation in a Couple of Clicks
Milton Keath - Senior Solutions Engineer
As ransomware increasingly becomes a global cybersecurity scourge, affecting both public and private sectors, the urgency for effective defense strategies escalates. Identifying an active ransomware attack is essential, but it's only the beginning. The pivotal question we address is: How can you take the teeth out of a ransomware attack before it causes real damage to your organization?
This webinar unveils the power of Akamai Guardicore Segmentation that empowers security practitioners to prevent, respond to, and recover from an active ransomware attack. Under the guidance of our esteemed Solutions Expert, Milton Keath, you will discover how to swiftly and effectively reinforce your cyber defenses.
We will explore practical, easy-to-implement strategies that enable you to:
- Drastically reduce your organization’s attack surface with just a few intuitive clicks, setting up a robust defense against potential ransomware attacks.
- Respond adeptly to ransomware incidents as they arise in your IT environment, ensuring minimal disruption and maximal security.
- Efficiently recover and restore your systems post-attack, implementing measures to prevent future reinfection.