No two ransomware attacks are exactly the same—hackers might exploit different entry points or make varied demands. Since a successful data breach is unpredictable and expensive, the best protection happens before data encryption starts.
Let’s go over the entire kill chain and explore which tools fit into each stage.
Reconnaissance
Attackers find high-value assets to target. Once they pick a mark, they’ll search for attack paths and vulnerabilities. Some use tools like BloodHound and Nmap to automate the process.
Tools:
Initial access
This is where the threat actor first gains unauthorized access. Strategies include sending phishing emails, exploiting system vulnerabilities, or simply buying passwords off the dark web.
Tools:
Email security gateways filter out malicious emails.
Firewalls and intrusion detection/prevention systems (IDPS) block malicious traffic.
Endpoint detection and response (EDR) solutions catch the initial launch of malicious code on an endpoint, such as a workstation.
Credential theft
Hackers want access to as much data as possible, and credentials are a simple way to get it. Anti-ransomware solutions could see stolen sign-ins as legitimate and not sound any alarm bells.
Hash dumping, key logging, and even a ready-to-use tool like Mimikatz can all expose credentials. If attackers can’t access the right data with their stolen log-ins, they might use a privilege escalation attack to gain higher-level permissions to apps, databases, and files.
Tools:
Identity and access management (IAM) solutions limit internal access to necessary files only, implement multi-factor authentication, and cut off access if needed.
EDR and NDR solutions monitor authentication attempts, network traffic, and application use for suspicious behavior.
Lateral movement
Once cybercriminals have a lot of stolen credentials, they move through the network to access sensitive data and critical systems. They’re looking for the high-value targets they mapped out earlier.
Tools:
Encryption
After bad actors gain unauthorized access, they use ransomware to encrypt files, locking out the users. They use this as leverage to demand a ransom.
Tools:
EDR spots the encryption.
Network monitoring and SIEM tools can flag unusual outbound data transfers and LOLBin abuse tied to exfiltration before ransomware ever runs
Decryption tools may help restore access, but this isn’t guaranteed.