Showing only posts in BleepingComputer. Show all posts.

Piecing Together the Puzzle: A Qilin Ransomware Investigation

Source

Huntress analysts reconstructed a Qilin ransomware attack from a single endpoint, using limited logs to reveal rogue ScreenConnect access, failed infostealer attempts, and the ransomware execution path. The investigation shows how validating multiple data sources can uncover activity even when visibility is reduced to a "pinhole." [...]

« newer articles | page 4 | older articles »