Back to Resources

SentinelOne VS HolyGhost Ransomware – Detection & Response

HolyGhost ransomware targets large enterprises, governments, and financial institutions. It was first seen in June 2021 and tied to North Korean threat actors (DEV-0530 and DarkSeoul).
Technically, HolyGhost uses multi-extortion tactics, and attackers exfiltrate all enticing data before encrypting target devices. Victims are extorted into paying the ransom to prevent data leakage and the decryption of files. HolyGhost campaigns make extensive use of customized tools and tradecraft. Recent HolyGhost payloads can be traced back to SiennaPurple and SiennaBlue variations observed in 2021 (written in Go). Initial delivery can vary, though some attackers have located vulnerable, public-facing servers on which to exploit CVE-2022-26352.

지금 읽기

세계에서 가장 앞선 사이버 보안 플랫폼 경험하기

지능적인 자율형 사이버 보안 플랫폼이 현재와 미래의 조직을 어떻게 보호할 수 있는지 알아보세요.