Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update 45 – Ransomware Early Warning: AD Attacks

Attackers leverage a number of techniques, but two of the most common are password spray attacks and kerberoasting. Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss how and why attackers leverage each technique and look at a real-life example of each type of attack from one of our attack lab scenarios.
Kilian Englert
1 min read
Published July 2, 2021
Last updated February 11, 2022

Once ransomware gangs establish a foothold in an organization, the next move is often to compromise additional accounts and escalate their privileges — which puts Active Directory squarely in their sights.

Attackers leverage a number of techniques, but two of the most common are password spray attacks and Kerberoasting. Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss how and why attackers leverage each technique and look at a real-life example of each type of attack from one of our attack lab scenarios.

👋To learn how else we can help, please visit us at: https://www.varonis.com/help/

👉Varonis customers also get access to great educational content to help support them on their journey: https://www.varonis.com/how-to-videos/

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

what-is-a-man-in-the-middle-attack:-detection-and-prevention-tips
What is a Man-in-the-Middle Attack: Detection and Prevention Tips
Man-in-the-middle attacks are sophisticated spying techniques attackers use to snoop on network traffic. Read on to learn more about these MitM attacks.
how-major-companies-find-leaks
How Major Companies Find Leaks
Learn how major companies like Google and Facebook detect leaks and see what techniques you can use to protect your company from attacks.
the-2021-manufacturing-data-risk-report-reveals-1-in-5-files-is-open-to-all-employees
The 2021 Manufacturing Data Risk Report Reveals 1 in 5 Files is Open to All Employees
Threats against the manufacturing sector continue — from big game ransomware groups that steal victim’s data before encrypting it, to nation-state attackers seeking technology secrets, to company insiders looking for…
threat-update-54-–-sso-imposter:-intrusion
Threat Update 54 – SSO Imposter: Intrusion
Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers…