Keynote | A Post-Apocalyptic Hellscape: What Ransomware Looks Like After RaaS

Subscribers:
64,400
Published on ● Video Link: https://www.youtube.com/watch?v=PzKXIZwbvzI



Duration: 24:45
106 views
2


SANS Ransomware Summit 2023

Keynote | A Post-Apocalyptic Hellscape: What Ransomware Looks Like After RaaS
Speaker: Allan Liska, CSIRT, Recorded Future

For several years Ransomware as a Service (RaaS) drove the growth of ransomware, but that has changed. The combination of stepped-up law enforcement and group infighting has made being part of a large open RaaS operation more dangerous, especially for threat actors who live outside of Russia. In the new ransomware "world" there is the LockBit warlord and everyone else. Most "new" ransomware groups are scavengers using stolen bits of code that they piece together to build shady "Franken-ransomware" that may or may not be decryptable. Into this hellscape steps ransomware defenders who now have to navigate smaller groups of threat actors who often don't know what they are doing and can't be relied upon to deliver what they promised. This talk will look at the new world of ransomware and what it means for defenders and incident responders.

View upcoming Summits: http://www.sans.org/u/DuS




Other Videos By SANS Institute


2023-08-22In Hot Pursuit: Tracking Ransomware Actors | Ryan Chapman | Aug 22, 2023
2023-08-17Analysis on legit tools abused in human-operated ransomware
2023-08-17Lessons from the Frontlines: Ransomware Attacks, New Techniques, and Old Tricks
2023-08-17Panel | Going Dark: DOS’ing Yourself for the Better
2023-08-17Cracking Ransomware: Bypassing Anti-Analysis Techniques and Decrypting LockBit Black Ransomware
2023-08-17Jackpot! Three Years Of ESXi Ransomware Incidents
2023-08-17Data Science for Ransomware Defense and Negotiation
2023-08-17A RaaS-ipe for Disaster: The Evolving RaaS Space, as Told Through Tools, Techniques, and Procedures
2023-08-17Beyond Encryption: Exploring the Tactics Ransomware Operators Use During Negotiation & their Impact
2023-08-17You Got a TOAD: A Novel Technique for Dropping Ransomware
2023-08-17Keynote | A Post-Apocalyptic Hellscape: What Ransomware Looks Like After RaaS
2023-08-15Your Cloud Security Journey: Key Trends, Capabilities, & Skills
2023-08-15FEATURE SEGMENT: Your Cloud Security Journey: Key Trends, Capabilities, & Skills
2023-08-15NICE Workforce for Cyber Security: Recruiting, Developing, and Planning Your Cybersecurity Workforce
2023-08-08Rule-Breakers Unite: Reimagining SANS HackFest
2023-08-03No Experience Required – Gaining Clarity for a Career in Cybersecurity
2023-08-02Unpacking the New SEC Regulations with John Pescatore
2023-08-01The Five Critical Controls for ICS | Host: Robert M. Lee | August 1, 2023
2023-07-27SANS Threat Analysis Rundown (STAR) with Katie Nickels
2023-07-26Cyber Leadership Analogies and Metaphors
2023-07-25Should Countries Ban Ransomware Payments? | Host: Ryan Chapman | July 25, 2023



Tags:
sans institute
information security
cyber security
cybersecurity
information security training
cybersecurity training
cyber security training