{"id":24103,"date":"2024-03-06T21:00:42","date_gmt":"2024-03-07T05:00:42","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/03\/06\/news-17833\/"},"modified":"2024-03-06T21:00:42","modified_gmt":"2024-03-07T05:00:42","slug":"news-17833","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/03\/06\/news-17833\/","title":{"rendered":"Defend against human-operated ransomware attacks with Microsoft Copilot for Security\u200b\u200b"},"content":{"rendered":"<p><strong>Credit to Author: Microsoft Security for Copilot Team| Date: Mon, 04 Mar 2024 17:00:00 +0000<\/strong><\/p>\n<p>Organizations everywhere are seeing an increase in human-operated <a href=\"https:\/\/www.microsoft.com\/security\/business\/security-101\/what-is-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> threats, with Microsoft\u2019s own telemetry showing a 200% increase in threats since September 2022.<sup>1<\/sup> When an entire organization is attacked, they need every advantage they can get to protect against skilled, coordinated cyber threats. The availability of <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\">Microsoft Copilot for Security<\/a>, brings SecOps teams a new tool with the power of generative AI to help outpace and outsmart threat actors. In the following demonstration videos, we take a detailed, step-by-step look at how it can help surface, contain, and mitigate a human-operated ransomware attack.\u00a0<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters material-color-brand-dark\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Copilot-1024x1024.jpg\" class=\"card-img img-object-cover\" alt=\"logo, company name\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Copilot-1024x1024.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Copilot-300x300.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Copilot-150x150.jpg 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Copilot-768x768.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/02\/Copilot.jpg 1500w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Copilot for Security<\/h2>\n<div class=\"mb-3\">\n<p>Powerful new capabilities, new integrations, and\u00a0industry-leading generative\u00a0AI.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\" class=\"btn btn-link text-decoration-none p-0\" > \t\t\t\t\t\t\t\t<span>Learn more<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"the-power-of-microsoft-defender-xdr-with-microsoft-copilot-for-security\">The power of Microsoft Defender XDR with Microsoft Copilot for Security\u202f&nbsp;<\/h2>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/siem-and-xdr\/microsoft-defender-xdr\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender XDR<\/a> coordinates detection, prevention, investigation, and response across endpoints, identities, email applications, and the cloud to provide integrated protection against sophisticated ransomware threats. In this series of demonstration videos, we share real-world scenarios where Copilot is helping SecOps teams navigate threat detection, investigation, and managed response. To begin, we look at a situation where a human-operated ransomware attack has just taken place.\u202fThe incident started with suspicious activity on two devices, where a credential theft tool was detected and stopped by <a href=\"https:\/\/learn.microsoft.com\/microsoft-365\/security\/defender\/automatic-attack-disruption\" target=\"_blank\" rel=\"noreferrer noopener\">automatic attack disruption<\/a> within Microsoft Defender XDR.&nbsp;<\/p>\n<p>Watch the video: <a href=\"https:\/\/www.youtube.com\/watch?v=q1UuDnBHgK8\" target=\"_blank\" rel=\"noreferrer noopener\">(Humor) Human Operate Ransomware<\/a>\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"respond-at-the-speed-and-scale-of-ai\">Respond at the speed and scale of AI\u202f\u202f&nbsp;<\/h2>\n<p>Bad actors can move through a system with damaging speed. And with the ever-increasing frequency and sophistication of attacks\u2014paired with the ongoing shortage of security talent\u2014it can be difficult for leaders to staff security teams completely. When every second counts\u2014like during an active ransomware incident\u2014Copilot for Security brings together critical context so security professionals can share clear, concise, and comprehensive summaries of active incidents\u2014giving affected parties a deep understanding of the situation, even when an incident happens after business hours. With the power of AI, Copilot is helping analysts write up these incident narratives 90% faster than in the past.<sup>2<\/sup>&nbsp;&nbsp;<\/p>\n<div class=\"wp-block-msxcm-kicker-container align-right\">\n<div class=\" wp-block-msxcm-kicker wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title text-neutral-600 text-uppercase\"> \t\t\tEndpoint Security\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-an-endpoint\" \t\t\ttarget=\"_blank\"> \t\t\t<span>Learn more<\/span>&nbsp;<span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-go\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p>In the case of this human-operated ransomware incident, <a href=\"https:\/\/www.microsoft.com\/security\/business\/endpoint-security\/microsoft-defender-endpoint\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Endpoints<\/a> had the first alert, detecting possible human operated malicious activity on a device. Many complex and sophisticated attacks like ransomware use scripts and tools like PowerShell and Mimikatz to access and manipulate files, tamper with system recovery settings, and delete file backups. In this incident, attackers also attempted to access Primary Refresh Tokens (PRT) and used Windows Sysinternals tools for evasion. But with line-by-line script examination in Copilot, security analysts could immediately understand what each section of code does, to quickly identify a script as malicious or benign. This Copilot capability directly helps junior security analysts &#8220;upskill&#8221; their expertise by learning the context behind the code.\u202f\u202f\u202f&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"gain-critical-incident-context\">Gain critical incident context\u202f&nbsp;<\/h2>\n<p>When faced with a complex attack, Copilot for Security can help analysts understand what\u2019s happening quickly, so they can protect and defend their organization at machine speed and scale. In an examination of the same ransomware incident, our next demonstration video shows how the Copilot incident summary focused in on a PowerShell script, leading analysts to a critical piece of the incident puzzle.&nbsp;&nbsp;<\/p>\n<p>Watch the video:<strong><em><strong> <\/strong><\/em><\/strong><a href=\"https:\/\/www.youtube.com\/watch?v=iPtb5DZOWg0\" target=\"_blank\" rel=\"noreferrer noopener\">Defender Embed to Standalone Copilot\u202f<\/a>\u00a0<\/p>\n<p>\u202fWithout enough time and without PowerShell expertise, it could be difficult for a security analyst to fully understand the ramifications of an attack like this. But this is where Copilot can help\u2014it quickly analyzes the PowerShell script, providing a plain English explanation of key steps within it. This helps analysts gain a full understanding of the incident and prioritize the containment and mitigation work that matters most. Copilot also works with <a href=\"https:\/\/www.microsoft.com\/security\/business\/siem-and-xdr\/microsoft-defender-threat-intelligence\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender Threat Intelligence<\/a> to investigate the script hosting, determine it&#8217;s malicious and share evidence connecting the script to a known threat actor. Moving from Microsoft Defender to the stand alone Copilot experience allows analysts to connect to <a href=\"https:\/\/azure.microsoft.com\/products\/microsoft-sentinel\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel<\/a> and <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-intune\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Intune<\/a>, surfacing a key piece of information in this serious incident\u2014a device that was noncompliant with current security policies, missing a key compliance update that may have prevented this attack. In just a few minutes, Copilot surfaced the right information to provide remediation steps and advance organizational understanding to proactively prepare for (and hopefully prevent) future attacks.&nbsp;&nbsp;&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"augment-critical-expertise-and-upskill-analysts\">Augment critical expertise\u202fand upskill analysts&nbsp;<\/h2>\n<p>In our last demonstration video, we look at how security teams can utilize Copilot to stretch their skill sets, understand incidents more completely, and gain an extra hand when resources are hard to come by.\u00a0<\/p>\n<p>Watch the video: <a href=\"https:\/\/www.youtube.com\/watch?v=Vd_URX7aRbA\" target=\"_blank\" rel=\"noreferrer noopener\">User account research<\/a><\/p>\n<p>Copilot for Security enables junior security analysts to complete more complex tasks with skills like natural language to Kusto Query Language translation and malicious script analysis. In this ransomware incident, analysts used Copilot to generate a PowerShell script to validate the configuration of all affected systems. By then looking at a compromised device, analysts learn the source of the compromise and discover the device wasn\u2019t compliant because it was mis-grouped when it was first assigned. With this information and more, surfaced and organized at the speed of AI by Copilot, analysts now have a more complete understanding of how the ransomware attack happened and how it can be prevented in the future. When a single ransomware incident can turn any organization upside down, security analysts can lean on Copilot for global threat intelligence, industry best practices, and tailored insights to outpace and outsmart adversaries.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more&nbsp;<\/h2>\n<p><a href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fmssecure.eventcore.com%2F%3Focid%3Dcmmu8lo2ds7&amp;data=05%7C02%7Cv-rebeaty%40microsoft.com%7Cac132f7d11914e6b698808dc333eafc3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638441592623744419%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=aiqII9llMblMQ12Q1LRKLfBarmxdhzKK478akyAle4s%3D&amp;reserved=0\" target=\"_blank\" rel=\"noreferrer noopener\">Join us online<\/a> at Microsoft Secure on March 13, 2024, to discover new ways to try Microsoft Copilot for Security. Experience world-class threat intelligence, end-to-end protection, and industry-leading, responsible AI through hands-on demos. And <a href=\"https:\/\/learning.eventbuilder.com\/IntroToMicrosoftCopilot\" target=\"_blank\" rel=\"noreferrer noopener\">register now<\/a> for our three-part webinar series \u201c<a href=\"https:\/\/learning.eventbuilder.com\/IntroToMicrosoftCopilot\" target=\"_blank\" rel=\"noreferrer noopener\">Intro to Microsoft Copilot for Security<\/a>.\u201d The first of three webinars takes place on March 19<sup>th<\/sup> on the basics of generative AI, followed by the second webinar on March 26<sup>th<\/sup> about how to get started with Copilot for Security. And lastly, the third webinar will take place on April 2<sup>nd<\/sup> and delves into Copilot for Security best practices.&nbsp;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-security-copilot\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a> about how Microsoft Copilot for Security can help your team protect at the speed and scale of AI. And for more helpful tips and information, <a href=\"https:\/\/youtube.com\/playlist?list=PL3ZTgFEc7LyuQRLD61q9YqPKEDlZj4j5u&amp;si=k6qjy-6mC61Q7tSQ\" target=\"_blank\" rel=\"noreferrer noopener\">view the Copilot for Security Playlist<\/a> on the <a href=\"https:\/\/www.youtube.com\/@MicrosoftSecurity\/featured\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security Channel<\/a> on YouTube.\u202f&nbsp;<\/p>\n<p>\u200b\u200bTo learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u202fBookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/security-insider\/microsoft-digital-defense-report-2023\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Digital Defense Report 2023 (MDDR) | Microsoft Security Insider<\/a><\/p>\n<p><sup>2<\/sup> <a href=\"https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=4648700\" target=\"_blank\" rel=\"noreferrer noopener\">Randomized Controlled Trial for Microsoft Security Copilot<\/a>, Benjamin G. Edelman, James Bono,&nbsp;Sida&nbsp;Peng, Roberto Rodriguez, Sandra&nbsp;Ho. November 29, 2023.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/04\/defend-against-human-operated-ransomware-attacks-with-microsoft-copilot-for-security\/\">Defend against human-operated ransomware attacks with Microsoft Copilot for Security\u200b\u200b<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/04\/defend-against-human-operated-ransomware-attacks-with-microsoft-copilot-for-security\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Microsoft Security for Copilot Team| Date: Mon, 04 Mar 2024 17:00:00 +0000<\/strong><\/p>\n<p>\u200bHuman-operated ransomware attacks are on the rise. See real-world examples of how Microsoft Copilot for Security helps SecOps teams defend their organizations against financial and reputational damage. <\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/03\/04\/defend-against-human-operated-ransomware-attacks-with-microsoft-copilot-for-security\/\">Defend against human-operated ransomware attacks with Microsoft Copilot for Security\u200b\u200b<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-24103","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24103"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24103\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}