Ransomeware for Financial Gain

ReconnaissanceResource DevelopmentInitial Access

Active Scanning

Acquire Infrastructure

Gather Victim Host Information

Compromise Accounts

Gather Victim Identity Information

Copromise Infrastruture

Gather Victim Org Information

Develop Capabilities

Phishing for Information

Establish Accounts

Search Closed Sources

Obtain Capabilities

Search Open Technical Database

Stage Capabilities

Search Open Websites/Domain

Drive-by Compromise

Search Victim Owned Websites

Exploit Public-Facing Application

External Remote Services

Hardware Additions

Phising

Spearphising attachment/Link/Via service

Replication Through Removable Media

Supply Chain Compromize

Trusted Relationship

Valid Accounts

Last updated