Analyzing Malicious Behavior Effectively with ExtraHop Reveal(x)
In the past decade, the information security industry has learned a lot about what attackers do during campaigns against targets. While we dont always understand motivation behind the attacks, most attacker goals are focused on data access and exfiltration of sensitive data. Sophisticated attackers often use advanced malware-based espionage that can aggressively pursue and compromise specific targets. Once a compromise has occurred, attackers attempt to maintain a persistent presence within the victims network, escalate privileges, and move laterally within the victims network to extract sensitive information to locations under the attackers control.