In this write-up, we will explore how to effectively hunt for ransomware from a network perspective, focusing on identifying Indicators of Compromise (IoCs) related to LockBit ransomware. The scenario in module 4 begins when your Incident Manager informs you of a potential data exfiltration incident involving a compromised client device, prompting a deep investigation using network-related artifacts such as endpoint network logs and IDS packet captures.
02 Oct, 2024
Threat Hunting With Network: Insights from OffSec TH-200 Course module 4
This write-up details the investigation of a ransomware incident involving CLIENT02, focusing on network artifacts such as IDS logs and Splunk queries to identify IoCs related to LockBit ransomware. The process involves using threat intelligence tools to analyze destination IPs and full packet captures with Wireshark, aiming to track down the origin of the attack.