accent 1 accent 2
Icon-Check@3x
CPE Cyber Attack Lab #4 Replay

Big-Game Ransomware Attack Simulation

On-Demand

Join us to see exactly how a big-game ransomware attack works and how to defend against it in our attack-and-respond simulation! 

 

+1 CPE

Watch now!

What you'll learn...

Ransomware gangs dwell in networks for months, stealing data and leaving backdoors before they start dropping ransom notes. 

We'll teach you how big-game ransomware gangs operate and showcase common tactics, techniques, and procedures (TTPs) that will help you prepare for an attack.

Then we'll run a step-by-step attack simulation and show you how our IR team would respond using the Varonis alerts that trigger at each and every phase.

Here's an overview of the attack:
  • Trick a user into opening an infected Word document
  • Perform network recon using reverse DNS lookups

  • Kerberoast a service account that has admin privileges 

  • Find and exfiltrate sensitive files using HTTP POST commands 

  • Deploy the ransomware payload to encrypt files 

 

Ian Levy
Ian Levy Security Analytics Manager, Varonis

Ian Levy is a Senior Security Analyst on the Incident Response and Security Architecture teams where every day they help organizations detect and respond to cyber threats. Having worked in the retail sector and being network-focused engineer for many years, Ian works to help organizations proactively reduce their risk posture and aids in protecting mission critical systems while safeguarding sensitive data. Ian graduated from Pennsylvania State University and majored in Information Sciences with a minor in Security and Risk Assessment.

“In terms of solutions, Varonis Edge was our MVP. Edge directed us to the computers with suspicious DNS requests, correlated them with specific users, and showed us the addresses we needed to block.” 

Want to see Varonis in action?

Request a demo