Combatting Ransomware with MITRE ATT&CK and Uptycs
Ransomware continues to dominate the threat landscape, affecting organizations of all sizes and industries. Ransomware variants use a diverse set of tactics and techniques described in the MITRE ATT&CK framework, targeting both Windows and Linux platforms.
In this session, Amit Malik and Abhijit Mohanta from the Uptycs Threat Research team will show how the behavior of ransomware such as Ryuk and NotPetya maps to the ATT&CK framework.
Takeaways include:
- How ATT&CK mapping can help you to ensure detection coverage for ransomware and give crucial context to investigators
- The techniques ransomware such as Ryuk and NotPetya use to establish persistence, escalate privileges, evade defenses, and more
- Key EDR capabilities to look for when defending your macOS, Windows, and Linux machines from ransomware