{"id":90684,"date":"2020-03-05T09:00:31","date_gmt":"2020-03-05T17:00:31","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90684"},"modified":"2025-06-26T23:58:35","modified_gmt":"2025-06-27T06:58:35","slug":"human-operated-ransomware-attacks-a-preventable-disaster","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/","title":{"rendered":"Human-operated ransomware attacks: A preventable disaster"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Human-operated&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/security-101\/what-is-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a>&nbsp;campaigns pose a significant and growing threat to businesses and represent one of the most impactful trends in cyberattacks today. In these hands-on-keyboard attacks, which are different from auto-spreading ransomware like WannaCry or NotPetya, adversaries employ credential theft and lateral movement methods traditionally associated with targeted attacks like those from nation-state actors. They exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.<\/p>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-6c531013 wp-block-group-is-layout-flex\">\n<p class=\"has-text-align-left wp-block-paragraph\">These attacks are known to take <br>advantage of network configuration<br> weaknesses and vulnerable services <br>to deploy ransomware payloads. And<br> while ransomware is the very visible action taken in these attacks, human operators also deliver other malicious payloads, steal credentials, and access<br> and exfiltrate data from compromised networks.<\/p>\n<\/div>\n\n\n\n<p class=\"has-background wp-block-paragraph\" style=\"background-color:#f1f0f0\"><strong><em>Additional resources<\/em><\/strong><em> Protect your organization against   ransomware:\u00a0<\/em><a href=\"https:\/\/aka.ms\/ransomware\"><em>aka.ms\/ransomware<\/em><\/a><br><em>earn how attackers operate:\u00a0<\/em><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/04\/28\/ransomware-groups-continue-to-target-healthcare-critical-services-heres-how-to-reduce-risk\/\"><em>Ransomware groups continue to target healthcare, critical services; here\u2019s how to reduce risk<\/em><\/a><\/p>\n<\/div>\n\n\n\n<p class=\"wp-block-paragraph\">News about ransomware attacks often focus on the downtimes they cause, the ransom payments, and the details of the ransomware payload, leaving out details of the oftentimes long-running campaigns and preventable domain compromise that allow these human-operated attacks to succeed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Based on our investigations, these campaigns appear unconcerned with stealth and have shown that they could operate unfettered in networks. Human operators compromise accounts with higher privileges, escalate privilege, or use credential dumping techniques to establish a foothold on machines and continue unabated in infiltrating target environments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Human-operated ransomware campaigns often start with \u201ccommodity malware\u201d like banking Trojans or \u201cunsophisticated\u201d attack vectors that typically trigger multiple detection alerts; however, these tend to be triaged as unimportant and therefore not thoroughly investigated and remediated. In addition, the initial payloads are frequently stopped by antivirus solutions, but attackers just deploy a different payload or use administrative access to disable the antivirus without attracting the attention of incident responders or security operations centers (SOCs).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Some well-known human-operated ransomware campaigns include REvil,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2016\/03\/17\/no-mas-samas-whats-in-this-ransomwares-modus-operandi\/\">Samas<\/a>, Bitpaymer, and Ryuk. Microsoft actively monitors these and other long-running human-operated ransomware campaigns, which have overlapping attack patterns. They take advantage of similar security weaknesses, highlighting a few key lessons in security, notably that these attacks are often preventable and detectable.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Combating and preventing attacks of this nature requires a shift in mindset, one that focuses on comprehensive protection required to slow and stop attackers before they can succeed. Human-operated attacks will continue to take advantage of security weaknesses to deploy destructive attacks until defenders consistently and aggressively apply security best practices to their networks. In this blog, we will highlight case studies of human-operated ransomware campaigns that use different entrance vectors and post-exploitation techniques but have overwhelming overlap in the security misconfigurations they abuse and the impact they have on organizations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"parinacota-group-smash-and-grab-monetization-campaigns\">PARINACOTA group: Smash-and-grab monetization campaigns<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">One actor that has emerged in this trend of human-operated attacks is an active, highly adaptive group that frequently drops Wadhrama as payload. Microsoft has been tracking this group for some time, but now refers to them as PARINACOTA, using our new naming designation for digital crime actors based on global volcanoes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">PARINACOTA impacts three to four organizations every week and appears quite resourceful: during the 18 months that we have been monitoring it, we have observed the group change tactics to match its needs and use compromised machines for various purposes, including cryptocurrency mining, sending spam emails, or proxying for other attacks. The group\u2019s goals and payloads have shifted over time, influenced by the type of compromised infrastructure, but in recent months, they have mostly deployed the Wadhrama ransomware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The group most often employs a smash-and-grab method, whereby they attempt to infiltrate a machine in a network and proceed with subsequent ransom in less than an hour. There are outlier campaigns in which they attempt reconnaissance and lateral movement, typically when they land on a machine and network that allows them to quickly and easily move throughout the environment.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">PARINACOTA\u2019s attacks typically brute forces their way into servers that have Remote Desktop Protocol (RDP) exposed to the internet, with the goal of moving laterally inside a network or performing further brute-force activities against targets outside the network. This allows the group to expand compromised infrastructure under their control. Frequently, the group targets built-in local administrator accounts or a list of common account names. In other instances, the group targets Active Directory (AD) accounts that they compromised or have prior knowledge of, such as service accounts of known vendors.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The group adopted the RDP brute force technique that the older ransomware called Samas (also known as SamSam) infamously used. Other malware families like GandCrab, MegaCortext, LockerGoga, Hermes, and RobbinHood have also used this method in targeted ransomware attacks. PARINACOTA, however, has also been observed to adapt to any path of least resistance they can utilize. For instance, they sometimes discover unpatched systems and use disclosed vulnerabilities to gain initial access or elevate privileges.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1120\" height=\"978\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Wadhrama-PARINACOTA-human-operated-ransomware.png\" alt=\"Wadhrama PARINACOTA attack chain\" class=\"wp-image-90697\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Wadhrama-PARINACOTA-human-operated-ransomware.png 1120w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Wadhrama-PARINACOTA-human-operated-ransomware-300x262.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Wadhrama-PARINACOTA-human-operated-ransomware-1024x894.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Wadhrama-PARINACOTA-human-operated-ransomware-768x671.png 768w\" sizes=\"auto, (max-width: 1120px) 100vw, 1120px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1. PARINACOTA infection chain<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We gained insight into these attacks by investigating compromised infrastructure that the group often utilizes to proxy attacks onto their next targets. To find targets, the group scans the internet for machines that listen on RDP port 3389. The attackers do this from compromised machines using tools like&nbsp;<em>Masscan.exe,<\/em>&nbsp;which can find vulnerable machines on the entire internet in under six minutes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once a vulnerable target is found, the group proceeds with a brute force attack using tools like&nbsp;<em>NLbrute.exe<\/em>&nbsp;or ForcerX, starting with common usernames like \u2018admin\u2019, \u2018administrator\u2019, \u2018guest\u2019, or \u2018test\u2019. After successfully gaining access to a network, the group tests the compromised machine for internet connectivity and processing capacity. They determine if the machine meets certain requirements before using it to conduct subsequent RDP brute force attacks against other targets. This tactic, which has not been observed being used by similar ransomware operators, gives them access to additional infrastructure that is less likely to be blocked. In fact, the group has been observed leaving their tools running on compromised machines for months on end.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On machines that the group doesn\u2019t use for subsequent RDP brute-force attacks, they proceed with a separate set of actions. This technique helps the attackers evade reputation-based detection, which may block their scanning boxes; it also preserves their command-and-control (C2) infrastructure. In addition, PARINACOTA utilizes administrative privileges gained via stolen credentials to turn off or stop any running services that might lead to their detection.&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/prevent-changes-to-security-settings-with-tamper-protection\">Tamper protection&nbsp;<\/a>in Microsoft Defender ATP prevents malicious and unauthorized to settings, including antivirus solutions and cloud-based detection capabilities.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">After disabling security solutions, the group often downloads a ZIP archive that contains dozens of well-known attacker tools and batch files for credential theft, persistence, reconnaissance, and other activities without fear of the next stages of the attack being prevented. With these tools and batch files, the group clears event logs using&nbsp;<em>wevutil.exe<\/em>, as well as conducts extensive reconnaissance on the machine and the network, typically looking for opportunities to move laterally using common network scanning tools. When necessary, the group elevates privileges from local administrator to SYSTEM using accessibility features in conjunction with a batch file or exploit-laden files named after the specific CVEs they impact, also known as the \u201cSticky Keys\u201d attack.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The group dumps credentials from the LSASS process, using tools like Mimikatz and ProcDump, to gain access to matching local administrator passwords or service accounts with high privileges that may be used to start as a scheduled task or service, or even used interactively. PARINACOTA then uses the same remote desktop session to exfiltrate acquired credentials. The group also attempts to get credentials for specific banking or financial websites, using&nbsp;<em>findstr.exe<\/em>&nbsp;to check for cookies associated with these sites.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1081\" height=\"1059\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig2-Mirosoft-Defender-ATP-alert-credential-theft.png\" alt=\"Microsoft Defender ATP alert for credential theft\" class=\"wp-image-90689\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig2-Mirosoft-Defender-ATP-alert-credential-theft.png 1081w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig2-Mirosoft-Defender-ATP-alert-credential-theft-300x294.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig2-Mirosoft-Defender-ATP-alert-credential-theft-1024x1003.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig2-Mirosoft-Defender-ATP-alert-credential-theft-768x752.png 768w\" sizes=\"auto, (max-width: 1081px) 100vw, 1081px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 2. Microsoft Defender ATP alert for credential theft<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">With credentials on hand, PARINACOTA establishes persistence using various methods, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Registry modifications using .bat or .reg files to allow RDP connections<img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig2-1.png\" alt=\"screenshot\" style=\"\"><\/li>\n\n\n\n<li class=\"wp-block-list-item\">Setting up access through existing remote assistance apps or installing a backdoor<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Creating new local accounts and adding them to the local administrators group<img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig2-2.png\" alt=\"screenshot\" style=\"\"><\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">To determine the type of payload to deploy, PARINACOTA uses tools like Process Hacker to identify active processes. The attackers don\u2019t always install ransomware immediately; they have been observed installing coin miners and using&nbsp;<em>massmail.exe<\/em>&nbsp;to run spam campaigns, essentially using corporate networks as distributed computing infrastructure for profit. The group, however, eventually returns to the same machines after a few weeks to install ransomware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The group performs the same general activities to deliver the ransomware payload:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Plants a malicious HTA file (<em>hta<\/em>\u00a0in many instances) using various autostart extensibility points (ASEPs), but often the registry Run keys or the Startup folder. The HTA file displays ransom payment instructions.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Deletes local backups using tools like\u00a0<em>exe<\/em>\u00a0to stifle recovery of ransomed files.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Stops active services that might interfere with encryption using\u00a0<em>exe<\/em>,\u00a0<em>net.exe<\/em>, or other tools.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"379\" height=\"653\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig3-PARINACOTA-stopping-services-and-processes.png\" alt=\"PARINACOTA stopping services and processes\" class=\"wp-image-90691\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig3-PARINACOTA-stopping-services-and-processes.png 379w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig3-PARINACOTA-stopping-services-and-processes-174x300.png 174w\" sizes=\"auto, (max-width: 379px) 100vw, 379px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 3. PARINACOTA stopping services and processes<\/em><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Drops an array of malware executables, often naming the files based on their intended behavior. If previous attempts to stop antivirus software have been unsuccessful, the group simply drops multiple variants of a malware until they manage to execute one that is not detected, indicating that even when detections and alerts are occurring, network admins are either not seeing them or not reacting to them.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">As mentioned, PARINACOTA has recently mostly dropped the Wadhrama ransomware, which leaves the following ransom note after encrypting target files:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1099\" height=\"662\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig4-Wadhrama-ransom-note.png\" alt=\"Wadhrama ransom note\" class=\"wp-image-90692\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig4-Wadhrama-ransom-note.png 1099w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig4-Wadhrama-ransom-note-300x181.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig4-Wadhrama-ransom-note-1024x617.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig4-Wadhrama-ransom-note-768x463.png 768w\" sizes=\"auto, (max-width: 1099px) 100vw, 1099px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 4. Wadhrama ransom note<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In several observed cases, targeted organizations that were able to resolve ransomware infections were unable to fully remove persistence mechanisms, allowing the group to come back and deploy ransomware again.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1074\" height=\"494\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection.png\" alt=\"Microsoft Defender ATP machine view showing reinfection by Wadhrama\" class=\"wp-image-90693\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection.png 1074w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection-300x138.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection-1024x471.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection-768x353.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection-539x249.png 539w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig5-Microsoft-Defender-ATP-reinfection-465x215.png 465w\" sizes=\"auto, (max-width: 1074px) 100vw, 1074px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 5. Microsoft Defender ATP machine view showing reinfection by Wadhrama<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">PARINACOTA routinely uses Monero coin miners on compromised machines, allowing them to collect uniform returns regardless of the type of machine they access. Monero is popular among cybercriminals for its privacy benefits: Monero not only restricts access to wallet balances, but also mixes in coins from other transactions to help hide the specifics of each transaction, resulting in transactions that aren\u2019t as easily traceable by amount as other digital currencies.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As for the ransomware component, we have seen reports of the group charging anywhere from .5 to 2 Bitcoins per compromised machine. This varies depending on what the attackers know about the organization and the assets that they have compromised. The ransom amount is adjusted based on the likelihood the organization will pay due to impact to their company or the perceived importance of the target.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"doppelpaymer-ransomware-follows-dridex\">Doppelpaymer: Ransomware follows Dridex<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Doppelpaymer ransomware recently caused havoc in several highly publicized attacks against various organizations around the world. Some of these attacks involved large ransom demands, with attackers asking for millions of dollars in some cases.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Doppelpaymer ransomware, like Wadhrama, Samas, LockerGoga, and Bitpaymer before it, does not have inherent worm capabilities. Human operators manually spread it within compromised networks using stolen credentials for privileged accounts along with common tools like PsExec and Group Policy. They often abuse service accounts, including accounts used to manage security products, that have domain admin privileges to run native commands, often stopping antivirus software and other security controls.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The presence of banking Trojans like Dridex on machines compromised by Doppelpaymer point to the possibility that Dridex (or other malware) is introduced during earlier attack stages through fake updaters, malicious documents in phishing email, or even by being delivered via the Emotet botnet.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While Dridex is likely used as initial access for delivering Doppelpaymer on machines in affected networks, most of the same networks contain artifacts indicating RDP brute force. This is in addition to numerous indicators of credential theft and the use of reconnaissance tools. Investigators have in fact found artifacts indicating that affected networks have been compromised in some manner by various attackers for several months before the ransomware is deployed, showing that these attacks (and others) are successful and unresolved in networks where diligence in security controls and monitoring is not applied.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The use of numerous attack methods reflects how attackers freely operate without disruption \u2013 even when available endpoint detection and response (EDR) and endpoint protection platform (EPP) sensors already detect their activities. In many cases, some machines run without standard safeguards, like security updates and cloud-delivered antivirus protection. There is also the lack of credential hygiene, over-privileged accounts, predictable local administrator and RDP passwords, and unattended EDR alerts for suspicious activities.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"624\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig6-Microsoft-Defender-ATP-alert-stop-sensor.png\" alt=\"Sample Microsoft Defender ATP alert\" class=\"wp-image-90694\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig6-Microsoft-Defender-ATP-alert-stop-sensor.png 660w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig6-Microsoft-Defender-ATP-alert-stop-sensor-300x284.png 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 6. Sample Microsoft Defender ATP alert<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The success of attacks relies on whether campaign operators manage to gain control over domain accounts with elevated privileges after establishing initial access. Attackers utilize various methods to gain access to privileged accounts, including common credential theft tools like Mimikatz and LaZagne. Microsoft has also observed the use of the Sysinternals tool ProcDump to obtain credentials from LSASS process memory. Attackers might also use LSASecretsView or a similar tool to access credentials stored in the LSA secrets portion of the registry. Accessible to local admins, this portion of the registry can reveal credentials for domain accounts used to run scheduled tasks and services.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1119\" height=\"1105\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Doppelpaymer-human-operated-ransomware-2.png\" alt=\"Doppelpaymer infection chain\" class=\"wp-image-90705\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Doppelpaymer-human-operated-ransomware-2.png 1119w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Doppelpaymer-human-operated-ransomware-2-300x296.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Doppelpaymer-human-operated-ransomware-2-1024x1011.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Doppelpaymer-human-operated-ransomware-2-768x758.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Doppelpaymer-human-operated-ransomware-2-100x100.png 100w\" sizes=\"auto, (max-width: 1119px) 100vw, 1119px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 7. Doppelpaymer infection chain<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Campaign operators continually steal credentials, progressively gaining higher privileges until they control a domain administrator-level account. In some cases, operators create new accounts and grant Remote Desktop privileges to those accounts.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Apart from securing privileged accounts, attackers use other ways of establishing persistent access to compromised systems. In several cases, affected machines are observed launching a base64-encoded PowerShell Empire script that connects to a C2 server, providing attackers with persistent control over the machines. Limited evidence suggests that attackers set up WMI persistence mechanisms, possibly during earlier breaches, to launch PowerShell Empire.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">After obtaining adequate credentials, attackers perform extensive reconnaissance of machines and running software to identify targets for ransomware delivery. They use the built-in command&nbsp;<em>qwinsta<\/em>&nbsp;to check for active RDP sessions, run tools that query Active Directory or LDAP, and ping multiple machines. In some cases, the attackers target high-impact machines, such as machines running systems management software. Attackers also identify machines that they could use to stay persistent on the networks after deploying ransomware.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Attackers use various protocols or system frameworks (WMI, WinRM, RDP, and SMB) in conjunction with PsExec to move laterally and distribute ransomware. Upon reaching a new device through lateral movement, attackers attempt to stop services that can prevent or stifle successful ransomware distribution and execution. As in other ransomware campaigns, the attackers use native commands to stop Exchange Server, SQL Server, and similar services that can lock certain files and disrupt attempts to encrypt them. They also stop antivirus software right before dropping the ransomware file itself.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Attempts to bypass antivirus protection and deploy ransomware are particularly successful in cases where:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Attackers already have domain admin privileges<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Tamper protection is off<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Cloud-delivered protection is off<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Antivirus software is not properly managed or is not in a healthy state<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft Defender ATP generates alerts for many activities associated with these attacks. However, in many of these cases, affected network segments and their associated alerts are not actively being monitored or responded to.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Attackers also employ a few other techniques to bypass protections and run ransomware code. In some cases, we found artifacts indicating that they introduce a legitimate binary and use Alternate Data Streams to masquerade the execution of the ransomware binary as legitimate binary.<br><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"607\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig8-Command-prompt-dump-output-of-the-Alternate-Data-Stream.png 942w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig8-Command-prompt-dump-output-of-the-Alternate-Data-Stream-300x276.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/fig8-Command-prompt-dump-output-of-the-Alternate-Data-Stream-768x707.png 768w\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/fig8-Command-prompt-dump-output-of-the-Alternate-Data-Stream.png\" alt=\"Command prmpt dump output of the Alternate Data Stream\"><br><em>Figure\u00a08. Command prompt dump output of the Alternate Data Stream<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Doppelpaymer ransomware binary used in many attacks are signed using what appears to be stolen certificates from&nbsp;<em>OFFERS CLOUD LTD<\/em>, which might be trusted by various security solutions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Doppelpaymer encrypts various files and displays a ransom note. In observed cases, it uses a custom extension name for encrypted files using information about the affected environment. For example, it has used&nbsp;<em>l33tspeak<\/em>&nbsp;versions of company names and company phone numbers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Notably, Doppelpaymer campaigns do not fully infect compromised networks with ransomware. Only a subset of the machines have the malware binary and a slightly smaller subset have their files encrypted. The attackers maintain persistence on machines that don\u2019t have the ransomware and appear intent to use these machines to come back to networks that pay the ransom or do not perform a full incident response and recovery.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"ryuk-human-operated-ransomware-initiated-from-trickbot-infections\">Ryuk: Human-operated ransomware initiated from Trickbot infections<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Ryuk is another active human-operated ransomware campaign that wreaks havoc on organizations, from corporate entities to local governments to non-profits by disrupting businesses and demanding massive ransom. Ryuk originated as a ransomware payload distributed over email, and but it has since been adopted by human operated ransomware operators.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Like Doppelpaymer, Ryuk is one of possible eventual payloads delivered by human operators that enter networks via banking Trojan infections, in this case Trickbot. At the beginning of a Ryuk infection, an existing Trickbot implant downloads a new payload, often Cobalt Strike or PowerShell Empire, and begins to move laterally across a network, activating the Trickbot infection for ransomware deployment. The use of Cobalt Strike beacon or a PowerShell Empire payload gives operators more maneuverability and options for lateral movement on a network. Based on our investigation, in some networks, this may also provide the added benefit to the attackers of blending in with red team activities and tools.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In our investigations, we found that this activation occurs on Trickbot implants of varying ages, indicating that the human operators behind Ryuk likely have some sort of list of check-ins and targets for deployment of the ransomware. In many cases, however, this activation phase comes well after the initial Trickbot infection, and the eventual deployment of a ransomware payload may happen weeks or even months after the initial infection.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In many networks, Trickbot, which can be distributed directly via email or as a second-stage payload to other Trojans like Emotet, is often considered a low-priority threat, and not remediated and isolated with the same degree of scrutiny as other, more high-profile malware. This works in favor of attackers, allowing them to have long-running persistence on a wide variety of networks. Trickbot, and the Ryuk operators, also take advantage of users running as local administrators in environments and use these permissions to disable security tools that would otherwise impede their actions.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1119\" height=\"1116\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware.png\" alt=\"Ryuk infection chain\" class=\"wp-image-90696\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware.png 1119w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware-300x300.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware-1024x1021.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware-150x150.png 150w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware-768x766.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/Ryuk-human-operated-ransomware-100x100.png 100w\" sizes=\"auto, (max-width: 1119px) 100vw, 1119px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 9. Ryuk infection chain<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once the operators have activated on a network, they utilize their Cobalt Strike or PowerShell tools to initiate reconnaissance and lateral movement on a network. Their initial steps are usually to use built-in commands such as net group to enumerate group membership of high-value groups like domain administrators and enterprise administrators, and to identify targets for credential theft.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Ryuk operators then use a variety of techniques to steal credentials, including the LaZagne credential theft tool. The attackers also save various registry hives to extract credentials from Local Accounts and the LSA Secrets portion of the registry that stores passwords of service accounts, as well as Scheduled Tasks configured to auto start with a defined account. In many cases, services like security and systems management software are configured with privileged accounts, such as domain administrator; this makes it easy for Ryuk operators to migrate from an initial desktop to server-class systems and domain controllers. In addition, in many environments successfully compromised by Ryuk, operators are able to utilize the built-in administrator account to move laterally, as these passwords are matching and not randomized.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Once they have performed initial basic reconnaissance and credential theft, the attackers in some cases utilize the open source security audit tool known as BloodHound to gather detailed information about the Active Directory environment and probable attack paths. This data and associated stolen credentials are accessed by the attacker and likely retained, even after the ransomware portion is ended.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The attackers then continue to move laterally to higher value systems, inspecting and enumerating files of interest to them as they go, possibly exfiltrating this data. The attackers then elevate to domain administrator and utilize these permissions to deploy the Ryuk payload.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The ransomware deployment often occurs weeks or even months after the attackers begin activity on a network. The Ryuk operators use stolen Domain Admin credentials, often from an interactive logon session on a domain controller, to distribute the Ryuk payload. They have been seen doing this via Group Policies, setting a startup item in the SYSVOL share, or, most commonly in recent attacks, via PsExec sessions emanating from the domain controller itself.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"improving-defenses-to-stop-human-operated-ransomware\">Improving defenses to stop human-operated ransomware<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">In human-operated ransomware campaigns, even if the ransom is paid, some attackers remain active on affected networks with persistence via PowerShell Empire and other malware on machines that may seem unrelated to ransomware activities. To fully recover from human-powered ransomware attacks, comprehensive incident response procedures and subsequent network hardening need to be performed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As we have learned from the adaptability and resourcefulness of attackers, human-operated campaigns are intent on circumventing protections and cleverly use what\u2019s available to them to achieve their goal, motivated by profit. The techniques and methods used by the human-operated ransomware attacks we discussed in this blog highlight these important lessons in security:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">IT pros play an important role in security<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Some of the most successful human-operated ransomware campaigns have been against servers that have antivirus software and other security intentionally disabled, which admins may do to improve performance. Many of the observed attacks leverage malware and tools that are already detected by antivirus. The same servers also often lack firewall protection and MFA, have weak domain credentials, and use non-randomized local admin passwords. Oftentimes these protections are not deployed because there is a fear that security controls will disrupt operations or impact performance. IT pros can help with determining the true impact of these settings and collaborate with security teams on mitigations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Attackers are preying on settings and configurations that many IT admins manage and control. Given the key role they play, IT pros should be part of security teams.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Seemingly rare, isolated, or commodity malware alerts can indicate new attacks unfolding and offer the best chance to prevent larger damage<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Human-operated attacks involve a fairly lengthy and complex attack chain before the ransomware payload is deployed. The earlier steps involve activities like commodity malware infections and credential theft that Microsoft Defender ATP detects and raises alerts on. If these alerts are immediately prioritized, security operations teams can better mitigate attacks and prevent the ransomware payload. Commodity malware infections like Emotet, Dridex, and Trickbot should be remediated and treated as a potential full compromise of the system, including any credentials present on it.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">Truly mitigating modern attacks requires addressing the infrastructure weakness that let attackers in<\/li>\n<\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Human-operated ransomware groups routinely hit the same targets multiple times. This is typically due to failure to eliminate persistence mechanisms, which allow the operators to go back and deploy succeeding rounds of payloads, as targeted organizations focus on working to resolve the ransomware infections.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Organizations should focus less on resolving alerts in the shortest possible time and more on investigating the attack surface that allowed the alert to happen. This requires understanding the entire attack chain, but more importantly, identifying and fixing the weaknesses in the infrastructure to keep attackers out.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">While Wadhrama, Doppelpaymer, Ryuk, Samas, REvil, and other human-operated attacks require a shift in mindset, the challenges they pose are hardly unique.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Removing the ability of attackers to move laterally from one machine to another in a network would make the impact of human-operated ransomware attacks less impactful and make the network more resilient against all kinds of cyberattacks. The top recommendations for mitigating ransomware and other human-operated campaigns are to practice credential hygiene and stop unnecessary communication between endpoints.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Here are relevant mitigation actions that enterprises can apply to build better security posture and be more resistant against cyberattacks in general:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-security-baselines\">Harden internet-facing assets<\/a>\u00a0and ensure they have the latest security updates. Use\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/next-gen-threat-and-vuln-mgt\">threat and vulnerability management<\/a>\u00a0to audit these assets regularly for vulnerabilities, misconfigurations, and suspicious activity.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Secure Remote Desktop Gateway using solutions like Azure Multi-Factor Authentication (MFA). If you don\u2019t have an MFA gateway, enable network-level authentication (NLA).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Practice the principle of least-privilege and maintain credential hygiene. Avoid the use of domain-wide, admin-level service accounts. Enforce strong\u00a0<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/securing-privileged-access\/securing-privileged-access#2-just-in-time-local-admin-passwords\">randomized, just-in-time local administrator passwords<\/a>. Use tools like\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/mt227395.aspx\">LAPS<\/a>.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Monitor for brute-force attempts. Check excessive failed authentication attempts (Windows security event ID 4625).<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Monitor for clearing of Event Logs, especially the Security Event log and PowerShell Operational logs. Microsoft Defender ATP raises the alert \u201cEvent log was cleared\u201d and Windows generates an Event ID 1102 when this occurs.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Turn on\u00a0<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Microsoft-Defender-ATP\/Tamper-protection-now-generally-available-for-Microsoft-Defender\/ba-p\/911482\">tamper protection<\/a>\u00a0features to prevent attackers from stopping security services.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Determine where highly privileged accounts are logging on and exposing credentials. Monitor and investigate logon events (event ID 4624) for logon type attributes. Domain admin accounts and other accounts with high privilege should not be present on workstations.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-antivirus\/enable-cloud-protection-windows-defender-antivirus\">Turn on cloud-delivered protection<\/a>\u00a0and automatic sample submission on Windows Defender Antivirus. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown threats.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-exploit-guard\/attack-surface-reduction-exploit-guard\">Turn on attack surface reduction rules<\/a>, including rules that block credential theft, ransomware activity, and suspicious use of PsExec and WMI. To address malicious activity initiated through weaponized Office documents, use rules that block advanced macro activity, executable content, process creation, and process injection initiated by Office applications. To assess the impact of these rules, deploy them in audit mode.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Turn on\u00a0<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/09\/12\/office-vba-amsi-parting-the-veil-on-malicious-macros\/\">AMSI for Office VBA<\/a>\u00a0if you have Office 365.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Utilize the\u00a0<a href=\"https:\/\/channel9.msdn.com\/Events\/Ignite\/New-Zealand-2016\/M377\">Windows Defender Firewall<\/a>\u00a0and your network firewall to prevent RPC and SMB communication among endpoints whenever possible. This limits lateral movement as well as other attack activities.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"1444\" height=\"1117\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/wp-content\/uploads\/2020\/03\/defenses-against-human-operated-ransomware-3.png\" alt=\"Improving defenses against human-operated ransomware\" class=\"wp-image-90704\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/defenses-against-human-operated-ransomware-3.png 1444w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/defenses-against-human-operated-ransomware-3-300x232.png 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/defenses-against-human-operated-ransomware-3-1024x792.png 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/defenses-against-human-operated-ransomware-3-768x594.png 768w\" sizes=\"auto, (max-width: 1444px) 100vw, 1444px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 10. Improving defenses against human-operated ransomware<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-microsoft-empowers-customers-to-combat-human-operated-attacks\">How Microsoft empowers customers to combat human-operated attacks<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The rise of adaptable, resourceful, and persistent human-operated attacks characterizes the need for advanced protection on multiple attack surfaces.&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/technology\/threat-protection\">Microsoft Threat Protection<\/a>&nbsp;delivers comprehensive protection for identities, endpoints, data, apps, and infrastructure. Through built-intelligence, automation, and integration, Microsoft Threat Protection combines and orchestrates into a single solution the capabilities of Microsoft Defender Advanced Threat Protection (ATP), Office 365 ATP, Azure ATP, and Microsoft Cloud App Security, providing customers integrated security and unparalleled visibility across attack vectors.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Building an optimal organizational security posture is key to defending networks against human-operated attacks and other sophisticated threats.&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Secure Score<\/a>&nbsp;assesses and measures an organization\u2019s security posture and provides recommended improvement actions, guidance, and control. Using a centralized dashboard in Microsoft 365 security center, organizations can compare their security posture with benchmarks and establish key performance indicators (KPIs).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">On endpoints,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/microsoft-365\/windows\/microsoft-defender-atp\">Microsoft Defender ATP<\/a>&nbsp;provides unified protection, investigation, and response capabilities. Durable machine learning and behavior-based protections detect human-operated campaigns at multiple points in the attack chain, before the ransomware payload is deployed. These advanced detections raise alerts on the Microsoft Defender Security Center, enabling security operations teams to immediately respond to attacks using the rich capabilities in Microsoft Defender ATP.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Microsoft-Defender-ATP\/MDATP-Threat-amp-Vulnerability-Management-now-publicly-available\/ba-p\/460977\">Threat and Vulnerability Management<\/a>&nbsp;capability uses a risk-based approach to the discovery, prioritization, and remediation of misconfigurations and vulnerabilities on endpoints. Notably, it allows security administrators and IT administrators to collaborate seamlessly to remediate issues. For example, through Microsoft Defender ATP\u2019s integration with Microsoft Intune and System Center Configuration Manager (SCCM), security administrators can create a remediation task in Microsoft Intune with one click.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Microsoft experts have been tracking multiple human operated ransomware groups. To further help customers, we released a Microsoft Defender ATP&nbsp;<a href=\"https:\/\/docs.microsoft.com\/en-us\/windows\/security\/threat-protection\/microsoft-defender-atp\/threat-analytics\">Threat Analytics<\/a>&nbsp;report on the campaigns and mitigations against the attack. Through Threat Analytics, customers can see indicators of Wadhrama, Doppelpaymer, Samas, and other campaign activities in their environments and get details and recommendations that are designed to help security operations teams to investigate and respond to attacks. The reports also include relevant advanced hunting queries that can further help security teams look for signs of attacks in their network.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Customers subscribed to&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/02\/28\/announcing-microsoft-threat-experts\/\">Microsoft Threat Experts<\/a>, the managed threat hunting service in Microsoft Defender ATP, get&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Microsoft-Defender-ATP\/Microsoft-Threat-Experts-reaches-general-availability\/ba-p\/502493\">targeted attack notification<\/a>&nbsp;on emerging ransomware campaigns that our experts find during threat hunting. The email notifications are designed to inform customers about threats that they need to prioritize, as well as critical information like timeline of events, affected machines, and indicators of compromise, which help in investigating and mitigating attacks. Additionally, with&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/28\/experts-on-demand-your-direct-line-to-microsoft-security-insight-guidance-and-expertise\/\">experts on demand<\/a>, customers can engage directly with Microsoft security analysts to get guidance and insights to better understand, prevent, and respond to human-operated attacks and other complex threats.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>Microsoft Threat Protection Intelligence Team<\/em><\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"talk-to-us\">Talk to us<\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Questions, concerns, or insights on this story? Join discussions at the&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/security-privacy-and-compliance\/bg-p\/securityprivacycompliance\/label-name\/Microsoft%20Threat%20Protection\">Microsoft Threat Protection<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/Microsoft-Defender-ATP\/bg-p\/MicrosoftDefenderATPBlog\">Microsoft Defender ATP<\/a>&nbsp;tech communities.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Read all&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/microsoft-security-intelligence\/\">Microsoft security intelligence blog posts<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Follow us on Twitter&nbsp;<a href=\"https:\/\/twitter.com\/MsftSecIntel\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>@MsftSecIntel<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.<\/p>\n","protected":false},"author":68,"featured_media":90699,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[90971,90831,90874],"footnotes":""},"post_tag":[3896,3898,3776],"threat-intelligence":[3735],"content-type":[3663],"job-role":[],"product":[],"topic":[3687],"coauthors":[3380],"class_list":["post-90684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-credential-theft","tag-elevation-of-privilege","tag-human-operated-ransomware","threat-intelligence-ransomware","content-type-research","topic-threat-intelligence","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-3-1694638266-241","review-flag-4-1694638266-512","review-flag-5-1694638266-171","review-flag-6-1694638266-691","review-flag-7-1694638266-851","review-flag-8-1694638266-352","review-flag-9-1694638266-118","review-flag-alway-1694638263-571","review-flag-anywh-1694638264-237","review-flag-artif-1694638272-22","review-flag-disable","review-flag-disabled","review-flag-lever-1694638263-909","review-flag-machi-1694638272-641","review-flag-new-1694638263-340"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Human-operated ransomware attacks: A preventable disaster | Microsoft Security Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Human-operated ransomware attacks: A preventable disaster | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-05T17:00:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-27T06:58:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Microsoft Threat Intelligence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Threat Intelligence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"24 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Threat Intelligence\"}],\"headline\":\"Human-operated ransomware attacks: A preventable disaster\",\"datePublished\":\"2020-03-05T17:00:31+00:00\",\"dateModified\":\"2025-06-27T06:58:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\"},\"wordCount\":4778,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png\",\"keywords\":[\"Credential theft\",\"Elevation of privilege\",\"Human-operated ransomware\"],\"articleSection\":[\"Cybersecurity\",\"Endpoint security\",\"Microsoft 365\",\"Microsoft Defender Advanced Threat Protection\",\"Microsoft security intelligence\",\"Ransomware\",\"Secure Score\",\"Security deployment\",\"Threat protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\",\"name\":\"Human-operated ransomware attacks: A preventable disaster | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png\",\"datePublished\":\"2020-03-05T17:00:31+00:00\",\"dateModified\":\"2025-06-27T06:58:35+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png\",\"width\":440,\"height\":268},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Human-operated ransomware attacks: A preventable disaster\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/060b835777058efc81d6828a64820f98\",\"name\":\"Microsoft Security Threat Intelligence - Editor\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g52243f56b7f8688616d4ca12dc0148e2\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g\",\"caption\":\"Microsoft Security Threat Intelligence - Editor\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eravena\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Human-operated ransomware attacks: A preventable disaster | Microsoft Security Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/","og_locale":"en_US","og_type":"article","og_title":"Human-operated ransomware attacks: A preventable disaster | Microsoft Security Blog","og_description":"In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to what they discover in a compromised network.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-03-05T17:00:31+00:00","article_modified_time":"2025-06-27T06:58:35+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware.png","type":"image\/png"}],"author":"Microsoft Threat Intelligence","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware.png","twitter_misc":{"Written by":"Microsoft Threat Intelligence","Est. reading time":"24 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-security-threat-intelligence\/","@type":"Person","@name":"Microsoft Threat Intelligence"}],"headline":"Human-operated ransomware attacks: A preventable disaster","datePublished":"2020-03-05T17:00:31+00:00","dateModified":"2025-06-27T06:58:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/"},"wordCount":4778,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png","keywords":["Credential theft","Elevation of privilege","Human-operated ransomware"],"articleSection":["Cybersecurity","Endpoint security","Microsoft 365","Microsoft Defender Advanced Threat Protection","Microsoft security intelligence","Ransomware","Secure Score","Security deployment","Threat protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/","name":"Human-operated ransomware attacks: A preventable disaster | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png","datePublished":"2020-03-05T17:00:31+00:00","dateModified":"2025-06-27T06:58:35+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/03\/human-operated-ransomware-blog-card.png","width":440,"height":268},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/03\/05\/human-operated-ransomware-attacks-a-preventable-disaster\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Human-operated ransomware attacks: A preventable disaster"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/060b835777058efc81d6828a64820f98","name":"Microsoft Security Threat Intelligence - Editor","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g52243f56b7f8688616d4ca12dc0148e2","url":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52c6f8d687a54d49c87e04326b24f4ed410c7a6535e21df3cca90d21039c9089?s=96&d=microsoft&r=g","caption":"Microsoft Security Threat Intelligence - Editor"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/eravena\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=90684"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90684\/revisions"}],"predecessor-version":[{"id":140593,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/90684\/revisions\/140593"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/90699"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=90684"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=90684"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=90684"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=90684"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=90684"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=90684"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=90684"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=90684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}