Case Study

How Do Ransomware Actors Scope Opportunities?

How Do Ransomware Actors Scope Opportunities?

Pages 12 Pages

In part 1 of this series, I discussed various tactics and techniques malicious actors use to find and attack their targets. In this paper, I discuss how relatively simple and automated it is for bad actors to source specific details about internet facing infrastructure, that can be used as potential exploit targets, and much of these details are available from publicly (free) available sources.

Join for free to read