Threat actor workflow


Minutes

Hours to Weeks

Hours to Weeks

Hours to Weeks

Hours to Weeks

Hours to Weeks

Days to Months


  1. Initial Access

Common process:

  1. Recon

Common process:

  1. Privilege escalation

Common process:

  1. Lateral movement

Common target:

  1. Exfiltration

  1. Deployment

Common deploy ways:

  1. Extortion

Ransomware groups

Untitled

Ransomware group sites


Dark web forums (Sell access & data news)


Latest Ransomware news