Fri, Apr 19, 2024

Akira Ransomware Makes a Play for VPNs Without Multi-Factor Authentication

Kroll Intrusion Lifecycle Stage
ATT&CK Technique
Initial Exploitation
T1133 External Remote Services
Internal Scouting
T1219 Remote Access Software (AnyDesk)
T1046 Network Service Discovery (Netscan)
Toolkit Deployment
Exfiltration
T1048.003 – Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol (WinSCP)
T1560.001 – Archive via Utility (WinRar)
Lateral Movement
T1021.001 – Remote Services – Remote Desktop Protocol
Mission Execution
T1486 – Data Encrypted for Impact 

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Cyber Threat Intelligence

Threat intelligence are fueled by frontline incident response intel and elite analysts to effectively hunt and respond to threats.

Kroll Responder MDR

Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.


24x7 Incident Response

Kroll is the largest global IR provider with experienced responders who can handle the entire security incident lifecycle.

Incident Response and Litigation Support

Kroll’s elite security leaders deliver rapid responses for over 3,000 incidents per year and have the resources and expertise to support the entire incident lifecycle.

Managed Security Services

World-renowned cyber investigators and leading technology fuel Kroll’s managed security services, augmenting security operations centres and incident response capabilities.


Digital Forensics Services

In the event of a security incident, Kroll’s digital forensics investigators can expertly help investigate and preserve data to help provide evidence and ensure business continuity.