Ryuk ransomware deployed two weeks after Trickbot infection

Ionut Ilascu reports:

Researchers at SetinelOne have detailed the activity observed from logs on a Cobalt Strike server that TrickBot used to profile networks and systems.

Once the actor took interest in a compromised network, they used modules from Cobalt Strike threat emulation software for red teams and penetration testers.

One component is the DACheck script to check if the current user has Domain Admin privileges and check the members of this group. They also used Mimikatz to extract passwords that would help with lateral movement.

Read more on BleepingComputer.

About the author: Dissent

Comments are closed.