Destructive malware targeting Ukrainian organizations

Credit to Author: Microsoft 365 Defender Threat Intelligence Team| Date: Sun, 16 Jan 2022 02:28:30 +0000

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine.

The post Destructive malware targeting Ukrainian organizations appeared first on Microsoft Security Blog.

Read more

Real-life cybercrime stories from DART, the Microsoft Detection and Response Team

Credit to Author: Todd VanderArk| Date: Mon, 09 Mar 2020 16:00:23 +0000

In the new DART Case Reports, you’ll find unique stories from our team’s engagements around the globe. Read the first in the series today.

The post Real-life cybercrime stories from DART, the Microsoft Detection and Response Team appeared first on Microsoft Security.

Read more

Ghost in the shell: Investigating web shell attacks

Credit to Author: Eric Avena| Date: Tue, 04 Feb 2020 17:30:40 +0000

Web shell attacks allow adversaries to run commands and steal data from an Internet-facing server or use the server as launch pad for further attacks against the affected organization.

The post Ghost in the shell: Investigating web shell attacks appeared first on Microsoft Security.

Read more

Threat hunting in Azure Advanced Threat Protection (ATP)

Credit to Author: Todd VanderArk| Date: Tue, 07 Jan 2020 17:00:53 +0000

DART was called into an engagement where the adversary had a foothold within the on-premises network, which had been gained through compromising cloud credentials. Luckily, this customer had deployed Azure ATP prior to the incident and it had already normalized authentication and identity transactions within the customer network.

The post Threat hunting in Azure Advanced Threat Protection (ATP) appeared first on Microsoft Security.

Read more

Ransomware response—to pay or not to pay?

Credit to Author: Todd VanderArk| Date: Mon, 16 Dec 2019 17:00:07 +0000

As part of Microsoft’s Detection and Response Team (DART) Incident Response engagements, we regularly get asked by customers about “paying the ransom” following a ransomware attack.

The post Ransomware response—to pay or not to pay? appeared first on Microsoft Security.

Read more

Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1

Credit to Author: Todd VanderArk| Date: Thu, 14 Nov 2019 17:00:56 +0000

A series on DART’s tools, techniques, and procedures for investigating cybersecurity incidents at their customer organizations. Part 1 introduces the team and gives a brief overview of the tools that DART utilizes.

The post Changing security incident response by utilizing the power of the cloud—DART tools, techniques, and procedures: part 1 appeared first on Microsoft Security.

Read more