Jessica Payne Profile
Jessica Payne

@jepayneMSFT

Followers
30K
Following
68
Media
16
Statuses
978

Security Person at Microsoft, currently in Windows Defender Security Research. Opinions are my own.

Joined October 2015
Don't wanna be here? Send us removal request.
@jepayneMSFT
Jessica Payne
6 years
Ransomware payloads are stylistic and interchangeable (to the extent that attackers are even using Wannacrypt sometimes) but focusing on their initial access, credential theft, and lateral movement techniques can give you a map to mitigation.
2
10
57
@jepayneMSFT
Jessica Payne
6 years
Understanding your network,and where credential overlap exists can be the difference between losing one or two less secured machines to an attacker and totally ransomed network. If you’re not sure what accounts are logging in where and why, you can use WEF
7
15
48
@jepayneMSFT
Jessica Payne
6 years
Hard truths of things causing tons of damage right now: RDP brute force of systems that is a one stop shop to total infrastructure compromise (and eventual ransomware) due to matching local admin passwords. This is relatively easy, and free, to fix:
Tweet card summary image
learn.microsoft.com
Get an overview of Windows Local Administrator Password Solution (Windows LAPS), including key scenarios and setup and management options.
2
13
58
@jepayneMSFT
Jessica Payne
6 years
Perfect can be the enemy of good - we know it’s not realistic for certain industries to be fully patched, and so do the attackers. But it doesn’t mean you can’t survey your estate to isolate those less secure systems and limit the possible overlap of credentials.
1
5
28
@jepayneMSFT
Jessica Payne
6 years
Human Operated Ransomware isn’t slowing down, but payloads are just a stop on a journey attackers are taking through your network. If you focus on the payload you’ll miss actions they performed in your network, and chances to detect and stop them sooner.
6
179
458
@MsftSecIntel
Microsoft Threat Intelligence
6 years
Multiple ransomware groups that have been accumulating access and maintaining persistence on target networks for several months activated dozens of ransomware deployments in the first two weeks of April.
7
297
605
@jepayneMSFT
Jessica Payne
6 years
Every report on a ransomware payload that digs into encryption methods and code artifacts but neglects the killchain that allowed it to infect an entire network deprives defenders of information to protect themselves. Payloads change, abuse of network configuration can be fixed.
2
7
27
@jepayneMSFT
Jessica Payne
6 years
Which Ransomware payload is deployed at the end of a killchain is pretty much a stylistic choice by the attackers. Human Operated Ransomware campaigns overlap in their entry vectors, C2 tools, and lateral movement techniques- and also in viable defenses.
Tweet card summary image
microsoft.com
In human-operated ransomware attacks, adversaries exhibit extensive knowledge of systems administration and common network security misconfigurations, perform thorough reconnaissance, and adapt to...
6
72
156
@jepayneMSFT
Jessica Payne
6 years
An insufficiently secured network is distributed computing resources to an attacker. If you have no host firewalls, matching local admin passwords, services that log in as highly privileged accounts and haven’t had an attack yet- it’s likely just because you weren’t selected.
0
13
42
@jepayneMSFT
Jessica Payne
6 years
Credential theft, lateral movement, data exfiltration -terms many don’t associate with ransomware. But that is what happens during these attacks and the mindset needs to shift. Paying a ransom doesn’t remove the attacker, and formatting a ransomed machine doesn’t undo the attack.
1
7
23
@jepayneMSFT
Jessica Payne
6 years
Threat Intelligence reports often ignore ‘commodity’ threats, or fail to explain how a threat can be prevented. We think differently, and want you to know how the most impactful threats work and how you can stop them. Stopping Ransomware is possible, with built in configurations.
@MsftSecIntel
Microsoft Threat Intelligence
6 years
New blog post: A comprehensive and in-depth look at one of the most impactful trends in cyberattacks today: human-operated ransomware campaigns, their techniques and methods, the shift in mindset they entail, and lessons in security they highlight
7
55
159
@jepayneMSFT
Jessica Payne
6 years
An insufficiently secured network is distributed computing resources to an attacker. If you have no host firewalls, matching local admin passwords, services that log in as highly privileged accounts and haven’t had an attack yet- it’s likely just because you weren’t selected.
0
13
42
@jepayneMSFT
Jessica Payne
6 years
Credential theft, lateral movement, data exfiltration -terms many don’t associate with ransomware. But that is what happens during these attacks and the mindset needs to shift. Paying a ransom doesn’t remove the attacker, and formatting a ransomed machine doesn’t undo the attack.
1
7
23
@jepayneMSFT
Jessica Payne
6 years
Our Human-Operated Ransomware blog is apparently 433 lines of research into threats we have been monitoring for years and advice organizations can use to prevent these attacks. If you need a quick overview before reading, Kevin summarized the key points :
2
8
20
@jepayneMSFT
Jessica Payne
6 years
Threat Intelligence reports often ignore ‘commodity’ threats, or fail to explain how a threat can be prevented. We think differently, and want you to know how the most impactful threats work and how you can stop them. Stopping Ransomware is possible, with built in configurations.
@MsftSecIntel
Microsoft Threat Intelligence
6 years
New blog post: A comprehensive and in-depth look at one of the most impactful trends in cyberattacks today: human-operated ransomware campaigns, their techniques and methods, the shift in mindset they entail, and lessons in security they highlight
7
55
159
@jepayneMSFT
Jessica Payne
6 years
Ransomware is an economic problem - attackers use the same techniques of RDP brute force and lateral movement for years because they still work. Increasing operational security is not only possible using native/builtin tools, it’s becoming a new business continuity requirement.
1
15
51
@jepayneMSFT
Jessica Payne
6 years
Ransomware is often talked about with the same ‘superpower’ and malware focused narrative APTs are. Both are humans usually using psexec, GPOs, and stolen credentials to move laterally and deploy malware. Mitigations exist and networks can be hardened:
@jepayneMSFT
Jessica Payne
7 years
Some things attackers like: -Domain Admin accounts that do logon type 4 or 5 to workstations -Accounts with weak Kerberos configs like DES encryption or no preauth -GPO settings that allow unexpected admin actions like loading drivers Why not check for these before they do?
4
126
354
@jepayneMSFT
Jessica Payne
7 years
If you want to see if a domain admin has logged in somewhere and exposed credentials (logon types 2,4,5,10) and track down accounts at risk or what might break if you reduce service account privileges you don’t even need fancy tools:
@jepayneMSFT
Jessica Payne
8 years
Build a fast, free, and effective Threat Hunting/Incident Response Console with Windows Event Forwarding and PowerBI:
0
28
176
@jepayneMSFT
Jessica Payne
7 years
If you want to stop an attacker from RDP brute forcing you and deploying ransomware as a domain admin via psexec or group policy you probably want to start by enabling NLA, randomizing your local passwords, and keeping domain admins from logging in to desktops.
3
21
116
@jepayneMSFT
Jessica Payne
7 years
If you want to stop an attacker from installing malware or placing a web shell on your Exhange server, you probably should start with ensuring service accounts and admins who have admin on those servers don’t log in to easily phished desktop class systems.
1
11
92