New Blog Post | A guide to combatting human-operated ransomware: Part 1

%3CLINGO-SUB%20id%3D%22lingo-sub-2768194%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20A%20guide%20to%20combatting%20human-operated%20ransomware%3A%20Part%201%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2768194%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CLO20b_Sabien_office_007-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F311624iFA009B8A01BBE741%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22CLO20b_Sabien_office_007-900x360.jpg%22%20alt%3D%22CLO20b_Sabien_office_007-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F09%2F20%2Fa-guide-to-combatting-human-operated-ransomware-part-1%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EA%20guide%20to%20combatting%20human-operated%20ransomware%3A%20Part%201%20%7C%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CSPAN%3EMicrosoft%E2%80%99s%20Detection%20and%20Response%20Team%20(DART)%20has%20helped%20customers%20of%20all%20sizes%2C%20across%20many%20industries%20and%20regions%2C%20investigate%20and%20remediate%20human-operated%20ransomware%20for%20over%20five%20years.%20This%20blog%20aims%20to%20explain%20the%20process%20and%20execution%20used%20in%20our%20customer%20engagements%20to%20provide%20perspective%20on%20the%20unique%20issues%20and%20challenges%20regarding%20human-operated%20ransomware.%20We%20will%20also%20discuss%20how%20DART%20leverages%20Microsoft%20solutions%20such%20as%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fendpoint-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FA%3E%3CSPAN%3E%2C%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fthreat-protection%2Fidentity-defender%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Defender%20for%20Identity%3C%2FA%3E%3CSPAN%3E%2C%20and%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fcloud-app-security%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Cloud%20App%20Security%3C%2FA%3E%3CSPAN%3E%26nbsp%3B(MCAS)%20within%20customer%20environments%20while%20collaborating%20with%20cross-functional%20threat%20intelligence%20teams%20across%20Microsoft%20who%20similarly%20track%20human-operated%20ransomware%20activities%20and%20behaviors.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2768194%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20365%20Defender%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Endpoint%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Defender%20for%20Identity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

CLO20b_Sabien_office_007-900x360.jpg

A guide to combatting human-operated ransomware: Part 1 | Microsoft Security Blog

Microsoft’s Detection and Response Team (DART) has helped customers of all sizes, across many industries and regions, investigate and remediate human-operated ransomware for over five years. This blog aims to explain the process and execution used in our customer engagements to provide perspective on the unique issues and challenges regarding human-operated ransomware. We will also discuss how DART leverages Microsoft solutions such as Microsoft Defender for EndpointMicrosoft Defender for Identity, and Microsoft Cloud App Security (MCAS) within customer environments while collaborating with cross-functional threat intelligence teams across Microsoft who similarly track human-operated ransomware activities and behaviors.

0 Replies