Top 10 Ransomware measures (Detection)
Ransomware Killchain

The list below points out examples of attacker techniques that are commonly observed in the context of ransomware campaigns. Each item contains exemplary recommendations for detection. The order of the items is random and does not represent prioritization. Attackers frequently change tactics and techniques. Up-to-date and detailed information including detection advice can be found in the MITRE ATT&CK knowledge base.
Ransomware measures (Detection)
10. Modification of Endpoint Security Software
To avoid detection by endpoint security software, security tools are often modified or deactivated on the client devices as part of ransomware campaigns. The modification or deactivation is implemented in particular via command line interpreters. In the Windows environment, the Windows Defender is often the target of the attackers. Changes to its configuration are typically made via the PowerShell command "Set-MpPreference". In addition, changes to the configuration may be reflected in the registry (HKLM:\SOFTWARE\Policies\Microsoft\Windows Defender).
Effect in phase 1, 2, 3, 4 and 5
- Short URL:
- https://www.bsi.bund.de/dok/ransomware-links