Emotet Leads To Quantum Ransomware Infection
Threat actors were observed using Emotet to gain access to the victim’s network and deploy Quantum ransomware to devices on the domain.
Various tools were used for lateral movement, data exfiltration, and remote access including Cobalt Strike, Rclone, Tactical RMM, and AnyDesk.
Legitimate Windows tools such as systeminfo, ping, net, nltest, and whoami were used for local and remote discovery.
Featured Resources
Subscribe to Our Blog
Subscribe now to get the latest insights, expert tips and updates on threat exposure validation.
Subscribe