top of page
Unit 2: How the Attack took Place
 Unit 2 : How the Attack took Place
does-malware-exist.jpg
Stages of the Attack:

Based on the cybersecurity investigation done by Sophos, the attack usually compromised of 6 stages.

Anchor 1
Anchor 2
Anchor 3
Anchor 4
Back to Top
Anchor 5
tip: Click on light blue underlined text to be directed to the glossary
Glossary

JBOSS

 

Windows RDP

​
 

Mimikatz

 

PsExec

 

PaExec

 

Red Hat's Java-based web server environment

- build, run, deploy, and manage enterprise Java applications

Remote Desktop Protocol (RDP) is a connection protocol that provide users with a graphical interface to connect to another computer over a network connection.

An open-source application that allows users to view and save authentication credentials like Kerberos tickets.

A portable tool from Microsoft that lets you run processes remotely using any user's credentials

Allows launching of Windows programs on remote Windows computers without needing to install software on the remote computer first.

©2021 by SamSam Ransomware Attacks. Proudly created with Wix.com

bottom of page