Ransomware gangs use every trick in the book to find and steal data before encrypting it. After landing in a new organization, they need to map out the resources, identify additional machines they want to compromise, and try to figure out which systems are the “juicy targets” storing valuable data.
There are several tactics for this, but one of the easiest and most direct ways is to leverage a common function virtually everywhere: DNS.
Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss what DNS is, how it works, and how attackers can “live off the land” to map out an organization’s network using a few command-line tools built into every OS.
Articles referenced in this video:
👋To learn how else we can help, please visit us at: https://www.varonis.com/help/
👉Varonis customers also get access to great educational content to help support them on their journey: https://www.varonis.com/how-to-videos/