In the tumultuous landscape of cybersecurity, the 12 months 2023 left an indelible mark with the brazen exploits of the Scattered Spider danger group. Their attacks qualified the nerve facilities of main money and insurance plan institutions, culminating in what stands as 1 of the most impactful ransomware assaults in latest memory.
When organizations have no reaction plan in place for these types of an attack, it can develop into overpowering trying to prioritize the next steps that will have a compounding affect on the menace actor’s potential to retain obtain to and management around a compromised network.
Silverfort’s risk analysis workforce interacted closely with the identity threats used by Scattered Spider. and in truth, built a response playbook in authentic time to react to an active Scattered Spider attack. This webinar will dissect the true-lifetime circumstance in which they were named on to develop and execute a response plan whilst attackers were being going inside of an organization’s hybrid atmosphere.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Hear immediately from the Silverfort workforce about the troubles they faced, including how to speedily and competently (and in as automated a manner as possible) meet the adhering to reaction aims:
- Set ‘roadblocks’ promptly in location to safeguard from more lateral movement from that stage forward
- Pinpoint consumer accounts that ended up compromised, with a exclusive emphasis on assistance accounts (a favored Scattered Spider concentrate on)
- Eradicate prospective destructive presence from the org’s identification infrastructure (again – a favorable and publicly documented Scattered Spider approach)
Furthermore, you will gain insights into the ways taken in reaction, concentrating on 3 proportions of lateral motion:
- Person Accounts – We’ll seem at the needed guidelines and checking for services accounts, admin people, and domain buyers
- Identification Infrastructure – We are going to talk about limiting person access, disabling insecure authentication protocols, and additional harden authentication prerequisites
- Other Area-Joined Equipment – We are going to search at limiting inter-machine communication for user’s workstations, briefly blocking insecure authentication protocols
.webi-a-box{ history-shade: #f6f7fd padding: 25px border-radius: 10px } .webi-a-box h2 { color: #333 margin-best: } .webi-a-box .cta-button { screen: inline-block margin-leading: 20px padding: 10px 20px track record-colour: #4469f5 color: #ffffff !important border-radius: 5px textual content-decoration: none changeover: track record-shade .3s relieve }
Listen to firsthand from Silverfort’s gurus in our approaching webinar. Minimal spots available – secure yours now.
Reserve Your Webinar Place ➜
See you there!
Identified this article interesting? This post is a contributed piece from 1 of our valued companions. Observe us on Twitter and LinkedIn to go through much more special articles we put up.
Some components of this short article are sourced from:
thehackernews.com