Ransomware Whack-a-Mole: The Takedown & Reemergence of LockBit’s RaaS Platform

Watch Andrew Maguire and Patrick Staubmann of VMRay provide insight into the current malware threat landscape, takedown, and sudden reemergence of the LockBit Ransomware as a Service (RaaS) platform. Together, they will cover the multi-stage attack chain methods from initial infection to ransomware deployment using phishing and malware loaders, as well as the impact of anti-sandbox evasion checks and why it’s important when performing Dynamic Sandbox Analysis. Wrapping up with a VMRay Analysis review of LockBit 3.0, Patrick explains how the malware threat data, IOCs, and artifacts can be used to help threat-hunting efforts to mitigate the impact of an ongoing ransomware attack.

Covered in The Webinar

Learn about current malware threats and the resurgence of the LockBit Ransomware

Understand the multi-stage attack chain, from phishing to ransomware deployment, and the role of anti-sandbox evasion

Discover how to use threat data and analysis to enhance threat-hunting and mitigate ransomware attacks

About The Speakers

Andrew Maguire

Sr. Product Marketing Manager

Andrew Maguire is a seasoned cybersecurity professional with over 20 years of experience in various areas of cybersecurity, including anti-virus, vulnerability assessment, firewalls, intrusion detection, and encryption in both cloud and on-premise B2B solutions. Andrew brings a wealth of global marketing perspectives to his work. He takes a methodical approach to product messaging, positioning, content creation, and the delivery of marketing assets to support product launches, lead generation, and sales enablement.

Patrick Staubmann

Threat Researcher

Patrick Staubmann joined VMRay as a threat researcher back in 2019. As part of the Threat Analysis team, he continuously researches the threat landscape and conducts analyses of malware samples in depth. To further improve the companies’ product, he also extends its detection capabilities in form of behaviour-based rules, YARA rules, and configuration extractors. He is especially interested in reverse-engineering, low-level system security and exploitation.

Explore Valuable Cybersecurity Resources

What Organizations Can Do to Mitigate Phishing Email Bypass

Healthcare Under Ransomware Attacks – Part 2: LockBit

“Good Enough” Sandbox Technology is Not Enough: The Risks of Evasive Malware & Choosing the Right Solution