{"id":42945,"date":"2021-09-20T17:00:49","date_gmt":"2021-09-20T17:00:49","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=97473"},"modified":"2021-09-20T17:00:49","modified_gmt":"2021-09-20T17:00:49","slug":"a-guide-to-combatting-human-operated-ransomware-part-1","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/","title":{"rendered":"A guide to combatting human-operated ransomware: Part 1"},"content":{"rendered":"<p><em>This blog is part one of a two-part series focused on how Microsoft DART helps customers with human-operated ransomware. For more guidance on human-operated ransomware and how to defend against these extortion-based attacks, refer to our <a href=\"https:\/\/aka.ms\/ransomware\" target=\"_blank\" rel=\"noopener\">human-operated ransomware docs page<\/a>.<\/em><\/p>\n<p>Microsoft\u2019s Detection and Response Team (DART) has helped customers of all sizes, across many industries and regions, investigate and remediate human-operated ransomware for over five years. This blog aims to explain the process and execution used in our customer engagements to provide perspective on the unique issues and challenges regarding human-operated ransomware. We will also discuss how DART leverages Microsoft solutions such as <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/endpoint-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Endpoint<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/identity-defender\" target=\"_blank\" rel=\"noopener\">Microsoft Defender for Identity<\/a>, and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/cloud-app-security\" target=\"_blank\" rel=\"noopener\">Microsoft Cloud App Security<\/a> (MCAS) within customer environments while collaborating with cross-functional threat intelligence teams across Microsoft who similarly track human-operated ransomware activities and behaviors.<\/p>\n<p>Human-operated ransomware is not a malicious software problem\u2014it\u2019s a human criminal problem. The solutions used to address commodity problems aren\u2019t enough to prevent a threat that more closely resembles a nation-state threat actor. It disables or uninstalls your antivirus software before encrypting files. They locate and corrupt or delete backups before sending a ransom demand. These actions are commonly done with legitimate programs that you might already have in your environment and are not considered malicious. In criminal hands, these tools are used maliciously to carry out attacks.<\/p>\n<p>Responding to the increasing threat of ransomware requires a combination of modern enterprise configuration, up-to-date security products, and the vigilance of trained security staff to detect and respond to the threats before data is lost.<\/p>\n<h2>Key steps in DART\u2019s approach to conducting ransomware incident investigations<\/h2>\n<p>To maximize DART\u2019s efforts to restore business continuity while simultaneously analyzing the details of the incident, a careful and thorough investigation is coordinated with remediation measures to ensure that the root cause is determined. These efforts take place as we assist and advise customers with the task of getting the organization up and running again in a secure manner.<\/p>\n<p>Every effort is made to determine how the adversary gained access to the customer\u2019s assets so that vulnerabilities can be remediated. Otherwise, it is highly likely that the same type of attack will take place again in the future. In some cases, the threat actor takes steps to \u201ccover their tracks\u201d and destroy evidence, so it is possible that the entire chain of events may not be evident.<\/p>\n<p>The following are three key steps in our ransomware investigations:<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97482 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DART-ransomware-investigation.png\" alt=\"Graphic illustrates the steps, goals, and initial questions in DART\u2019s ransomware investigation assistance. \" width=\"1783\" height=\"965\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DART-ransomware-investigation.png 1783w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DART-ransomware-investigation-300x162.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DART-ransomware-investigation-1024x554.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DART-ransomware-investigation-768x416.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DART-ransomware-investigation-1536x831.png 1536w\" sizes=\"auto, (max-width: 1783px) 100vw, 1783px\"><\/p>\n<p><em>Figure 1. Key steps in DART\u2019s ransomware investigations.<\/em><\/p>\n<h3>1. Assess the current situation<\/h3>\n<p>This is critical to understanding the scope of the incident and for determining the best people to assist and to plan and scope the investigation and remediation tasks. Asking these initial questions is crucial in helping us determine the situation being dealt with:<\/p>\n<p><strong>What initially made you aware of the ransomware attack?<\/strong><\/p>\n<p>If the initial threat was identified by IT staff (like noticing backups being deleted, antivirus (AV) alert, endpoint detection and response (EDR) alert, suspicious system changes), it is often possible to take quick decisive measures to thwart the attack, typically by disabling all inbound and outbound internet communication. This may temporarily affect business operations, but that would typically be much less impactful than an adversary deploying ransomware.<\/p>\n<p>If the threat was identified by a user call to the IT helpdesk, there may be enough advance warning to take defensive measures to prevent or minimize the effects of the attack. If the threat was identified by an external entity (like law enforcement or a financial institution), it is likely that the damage is already done, and you will see evidence in your environment that the threat actor has already gained administrative control of your network. This can range from ransomware notes, locked screens, or ransom demands.<\/p>\n<p><strong>What date\/time did you first learn of the incident?<\/strong><\/p>\n<p>Establishing the initial activity date and time is important because it helps narrow the scope of the initial triage for \u201cquick wins.\u201d Additional questions may include:<\/p>\n<ul>\n<li>What updates were missing on that date? This is important to understand what vulnerabilities may have been exploited by the adversary.<\/li>\n<li>What accounts were used on that date?<\/li>\n<li>What new accounts have been created since that date?<\/li>\n<\/ul>\n<p><strong>What logs (such as AV, EDR, and VPN) are available, and is there any indication that the actor is currently accessing systems?<\/strong><\/p>\n<p>Logs are an indicator of suspected compromise. Follow-up questions may include:<\/p>\n<ul>\n<li>Are logs being aggregated in a SIEM (like <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/?&amp;ef_id=Cj0KCQjwkIGKBhCxARIsAINMioLe7kGz9jffae_vLywiHnitdZE4gN87awwT8GqSxP2kJ5_hGMu7bfsaAnMpEALw_wcB:G:s&amp;OCID=AID2200277_SEM_Cj0KCQjwkIGKBhCxARIsAINMioLe7kGz9jffae_vLywiHnitdZE4gN87awwT8GqSxP2kJ5_hGMu7bfsaAnMpEALw_wcB:G:s&amp;gclid=Cj0KCQjwkIGKBhCxARIsAINMioLe7kGz9jffae_vLywiHnitdZE4gN87awwT8GqSxP2kJ5_hGMu7bfsaAnMpEALw_wcB#overview\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Sentinel<\/a>, Splunk, ArcSight) and current? What is the retention period of this data?<\/li>\n<li>Are there any suspected compromised systems that are experiencing unusual activity?<\/li>\n<li>Are there any suspected compromised accounts that appear to be actively used by the adversary?<\/li>\n<li>Is there any evidence of active command and controls (C2s) in EDR, Firewall, VPN, Proxy, and other logs?<\/li>\n<\/ul>\n<p>As part of assessing the current situation, DART may require a domain controller (DC) that was not ransomed, a recent backup of a DC, or a recent DC taken offline for maintenance\/upgrades. We also ask our customers whether <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access-management\/mfa-multi-factor-authentication\/?&amp;ef_id=Cj0KCQjwkIGKBhCxARIsAINMioKehnOAgRRbPeOcI9bORrUwgb7LkrGi142e1zwjuplDaiZWnLJSnm0aAnbQEALw_wcB:G:s&amp;OCID=AID2200938_SEM_Cj0KCQjwkIGKBhCxARIsAINMioKehnOAgRRbPeOcI9bORrUwgb7LkrGi142e1zwjuplDaiZWnLJSnm0aAnbQEALw_wcB:G:s&amp;gclid=Cj0KCQjwkIGKBhCxARIsAINMioKehnOAgRRbPeOcI9bORrUwgb7LkrGi142e1zwjuplDaiZWnLJSnm0aAnbQEALw_wcB\" target=\"_blank\" rel=\"noopener\">multifactor authentication<\/a> (MFA) was required for everyone in the company and if <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/?&amp;ef_id=Cj0KCQjwkIGKBhCxARIsAINMioLZ_GSyl-lyuVFWW2SIkL-77U7LsMirDVPgDLLBJDxske2MjzviF7AaAk70EALw_wcB:G:s&amp;OCID=AID2200277_SEM_Cj0KCQjwkIGKBhCxARIsAINMioLZ_GSyl-lyuVFWW2SIkL-77U7LsMirDVPgDLLBJDxske2MjzviF7AaAk70EALw_wcB:G:s&amp;gclid=Cj0KCQjwkIGKBhCxARIsAINMioLZ_GSyl-lyuVFWW2SIkL-77U7LsMirDVPgDLLBJDxske2MjzviF7AaAk70EALw_wcB#overview\" target=\"_blank\" rel=\"noopener\">Microsoft Azure Active Directory<\/a> was used.<\/p>\n<h3>2. Identify line-of-business (LOB) apps that are unavailable due to the incident<\/h3>\n<p>This step is critical in figuring out the quickest way to get systems back online while obtaining the evidence required.<\/p>\n<p><strong>Does the application require an identity?<\/strong><\/p>\n<ul>\n<li>How is authentication performed?<\/li>\n<li>How are credentials such as certificates or secrets stored and managed?<\/li>\n<\/ul>\n<p><strong>Are tested backups of the application, configuration, and data available?<\/strong><\/p>\n<p>Are the contents and integrity of backups regularly verified using a restore exercise? This is particularly important after configuration management changes or version upgrades.<\/p>\n<h3>3. Explain the compromise recovery (CR) process<\/h3>\n<p>This is a follow-up engagement that may be necessary if DART determines that the control plane (typically Active Directory) has been compromised.<\/p>\n<p>DART\u2019s investigation always has a goal of providing output that feeds directly into the CR process. CR is the process by which we remove the nefarious attacker control from an environment and tactically increase security posture within a set period. CR takes place post-security breach. To learn more about CR, read the Microsoft Compromise Recovery Security Practice team\u2019s blog <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/06\/09\/crsp-the-emergency-team-fighting-cyber-attacks-beside-customers\/\" target=\"_blank\" rel=\"noopener\">CRSP: The emergency team fighting cyber attacks beside customers<\/a>.<\/p>\n<p>Once we have gathered the responses to the questions above, we can build a list of tasks and assign owners. A key factor in a successful incident response engagement is thorough, detailed documentation of each work item (such as the owner, status, findings, date, and time), making the compilation of findings at the end of the engagement a straightforward process.<\/p>\n<h2>How DART leverages Microsoft security solutions to combat human-operated ransomware<\/h2>\n<p>DART leverages cross-functional teams, such as internal threat intelligence teams, who track adversary activities and behaviors, customer support, and product development teams behind Microsoft products and services. DART also collaborates with other incident response vendors the customer may have engaged and will share findings whenever possible.<\/p>\n<p>DART relies heavily on data for all investigations. The team uses existing deployments of Microsoft solutions, such as Defender for Endpoint, Defender for Identity, and MCAS within customer environments along with custom forensic data collection for additional analysis. If these sensors are not deployed, DART also requests that the customer deploy these to gain deeper visibility into the environment, correlate against threat intelligence sources, and enable our analysts to scale in speed and agility.<\/p>\n<h3>Microsoft Defender for Endpoint<\/h3>\n<p>Microsoft Defender for Endpoint is Microsoft\u2019s enterprise endpoint security platform designed to help enterprise network security analysts prevent, detect, investigate, and respond to advanced threats. As shown in the image below, Defender for Endpoint can detect attacks using advanced behavioral analytics and machine learning. DART analysts use Defender for Endpoint for attacker behavioral analytics.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97488 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack.jpg\" alt=\"Screengrab from the Microsoft Defender Security Center that shows a pass-the-ticket attack alert. \" width=\"1100\" height=\"673\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack.jpg 1100w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack-300x184.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack-1024x627.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack-768x470.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack-440x268.jpg 440w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MDE-pass-the-ticket-attack-392x240.jpg 392w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\"><\/p>\n<p><em>Figure 2. Sample alert in Microsoft Defender for Endpoint for a pass-the-ticket attack.<\/em><\/p>\n<p>DART analysts can also perform advanced hunting queries to pivot off indicators of compromise (IOCs) or search for known behavior if a threat actor group is identified.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97491 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Advanced-hunting.jpg\" alt=\"Screengrab from the Microsoft Defender Security Center that shows advanced hunting, a query-based threat hunting tool.\" width=\"1100\" height=\"675\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Advanced-hunting.jpg 1100w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Advanced-hunting-300x184.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Advanced-hunting-1024x628.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Advanced-hunting-768x471.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/Advanced-hunting-392x240.jpg 392w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\"><\/p>\n<p><em>Figure 3. Advanced hunting queries to locate known attacker behavior.<\/em><\/p>\n<p>In Defender for Endpoint, customers have access to a real-time expert-level monitoring and analysis service by Microsoft Threat Experts for ongoing suspected actor activity. Customers can also collaborate with <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/mtp\/microsoft-threat-experts?view=o365-worldwide#collaborate-with-experts-on-demand\" target=\"_blank\" rel=\"noopener\">experts on demand<\/a> for additional insights into alerts and incidents.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97494 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DEP.png\" alt=\"Screengrab from the Microsoft Defender Security Center that shows sample ransomware alerts.\" width=\"1100\" height=\"561\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DEP.png 1100w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DEP-300x153.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DEP-1024x522.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DEP-768x392.png 768w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\"><\/p>\n<p><em>Figure 4. Defender for Endpoint shows detailed ransomware activity.<\/em><\/p>\n<h3>Microsoft Defender for Identity<\/h3>\n<p>DART leverages Microsoft Defender for Identity to investigate known compromised accounts and to find potentially compromised accounts in your organization. Defender for Identity sends alerts for known malicious activity that actors often use such as DCSync attacks, remote code execution attempts, and pass-the-hash attacks. Defender for Identity enables our team to pinpoint nefarious activity and accounts to narrow down our investigation.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97497 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DI-alert.png\" alt=\"Screengrab of alerts in Microsoft Defender for Identity showing malicious activity related to ransomware attacks.\" width=\"1340\" height=\"352\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DI-alert.png 1340w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DI-alert-300x79.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DI-alert-1024x269.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DI-alert-768x202.png 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/DI-alert-1335x352.png 1335w\" sizes=\"auto, (max-width: 1340px) 100vw, 1340px\"><\/p>\n<p><em>Figure 5. Defender for Identity sends alerts for known malicious activity related to ransomware attacks.<\/em><\/p>\n<h3>Microsoft Cloud App Security<\/h3>\n<p>MCAS allows DART analysts to detect unusual behavior across cloud apps to identify ransomware, compromised users, or rogue applications. MCAS is Microsoft\u2019s cloud access security broker (CASB) solution that allows for monitoring of cloud services and data access in cloud services by users.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone wp-image-97500 size-full\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MCAS-dashboard.png\" alt=\"Screengrab of the Microsoft Cloud App Security dashboard showing open alerts and a sample list of users to investigate.\" width=\"1101\" height=\"645\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MCAS-dashboard.png 1101w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MCAS-dashboard-300x176.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MCAS-dashboard-1024x600.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2021\/09\/MCAS-dashboard-768x450.png 768w\" sizes=\"auto, (max-width: 1101px) 100vw, 1101px\"><\/p>\n<p><em>Figure 6. The Microsoft Cloud App Security dashboard allows DART analysis to detect unusual behavior across cloud apps.<\/em><\/p>\n<h3>Microsoft Secure Score<\/h3>\n<p>The Microsoft 365 Defender stack provides live remediation recommendations to reduce the attack surface. <a href=\"https:\/\/security.microsoft.com\/securescore\" target=\"_blank\" rel=\"noopener\">Microsoft Secure Score<\/a> is a measurement of an organization\u2019s security posture, with a higher number indicating more improvement actions taken. Refer to <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/security\/defender\/microsoft-secure-score?view=o365-worldwide\" target=\"_blank\" rel=\"noopener\">our documentation<\/a> to find out more about how your organization can leverage this feature to prioritize remediation actions that are based on their environment.<\/p>\n<h2>Understand your business risks<\/h2>\n<p>Beyond the immediate risk of encrypted files, understanding the disruption to business operations, data theft, extortion, follow-on attacks, regulatory and compliance reporting, and damage to reputation fall outside technical controls. Microsoft DART recommends each organization weigh these risks when determining the appropriate way to respond based on the organization\u2019s policies, risk appetite, and applicable regulatory requirements.<\/p>\n<p>Microsoft Defender for Endpoint, Microsoft Defender for Identity, and MCAS all work seamlessly together to provide customers with enhanced visibility of the attacker\u2019s actions within and investigate attacks. Given our vast experience and expertise in investigating countless human-operated ransomware events over the past few years, we have shared what we consider best practices.<\/p>\n<h2>Learn more<\/h2>\n<p>Want to learn more about DART? Read our past <a href=\"https:\/\/www.microsoft.com\/security\/blog\/microsoft-detection-and-response-team-dart-blog-series\/\" target=\"_blank\" rel=\"noopener\">blog posts<\/a>.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/20\/a-guide-to-combatting-human-operated-ransomware-part-1\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As human-operated ransomware is on the rise, Microsoft\u2019s Detection and Response Team (DART) shares how they investigate these attacks and what to consider when faced with a similar event in your organization.<br \/>\nThe post A guide to combatting human-operated ransomware: Part 1 appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":42946,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[347,8661,8337,8264],"class_list":["post-42945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-cybersecurity","tag-dart","tag-detection-and-response-team-dart","tag-microsoft-detection-and-response-team-dart"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A guide to combatting human-operated ransomware: Part 1 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A guide to combatting human-operated ransomware: Part 1 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-20T17:00:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/a-guide-to-combatting-human-operated-ransomware-part-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1783\" \/>\n\t<meta property=\"og:image:height\" content=\"965\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"A guide to combatting human-operated ransomware: Part 1\",\"datePublished\":\"2021-09-20T17:00:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/\"},\"wordCount\":1781,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/a-guide-to-combatting-human-operated-ransomware-part-1.png\",\"keywords\":[\"Cybersecurity\",\"DART\",\"Detection and Response Team (DART)\",\"Microsoft Detection and Response Team (DART)\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/\",\"name\":\"A guide to combatting human-operated ransomware: Part 1 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/a-guide-to-combatting-human-operated-ransomware-part-1.png\",\"datePublished\":\"2021-09-20T17:00:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/a-guide-to-combatting-human-operated-ransomware-part-1.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/a-guide-to-combatting-human-operated-ransomware-part-1.png\",\"width\":1783,\"height\":965},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/a-guide-to-combatting-human-operated-ransomware-part-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A guide to combatting human-operated ransomware: Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A guide to combatting human-operated ransomware: Part 1 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/","og_locale":"en_US","og_type":"article","og_title":"A guide to combatting human-operated ransomware: Part 1 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-09-20T17:00:49+00:00","og_image":[{"width":1783,"height":965,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/a-guide-to-combatting-human-operated-ransomware-part-1.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"A guide to combatting human-operated ransomware: Part 1","datePublished":"2021-09-20T17:00:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/"},"wordCount":1781,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/a-guide-to-combatting-human-operated-ransomware-part-1.png","keywords":["Cybersecurity","DART","Detection and Response Team (DART)","Microsoft Detection and Response Team (DART)"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/","url":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/","name":"A guide to combatting human-operated ransomware: Part 1 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/a-guide-to-combatting-human-operated-ransomware-part-1.png","datePublished":"2021-09-20T17:00:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/a-guide-to-combatting-human-operated-ransomware-part-1.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/09\/a-guide-to-combatting-human-operated-ransomware-part-1.png","width":1783,"height":965},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/a-guide-to-combatting-human-operated-ransomware-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity","item":"https:\/\/www.threatshub.org\/blog\/tag\/cybersecurity\/"},{"@type":"ListItem","position":3,"name":"A guide to combatting human-operated ransomware: Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=42945"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/42945\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/42946"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=42945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=42945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=42945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}