SamSam and Mitre ATT&CK

The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report.The Photon Research Team have used the MITRE ATT&CK™ framework to map the tactics, techniques, and procedures detailed in the indictment and provide key lessons for organizations to take away. Additional on the tooling used for the SamSam ransomware attacks are available in the Avoiding the Shakedown section of our “A Tale of Epic Extortions” research report

Previous Report
18 Reasons for Digital Risk Management
18 Reasons for Digital Risk Management

Learn 18 reasons why your organization needs digital risk management in this infographic.

Next Report
5 Ways Cybercriminals Can Access Your Emails Without Phishing
5 Ways Cybercriminals Can Access Your Emails Without Phishing

Here are 5 ways that cybercriminals gain access to emails without conducting a phishing campaign or network...

×

Cyber Threat Intelligence Solutions Guide

First Name
Last Name
Company
Job Title
Country
Thank you!
Error - something went wrong!