SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsIn this month's reboot of the SANS Stay Ahead of Ransomware live stream, we dove into one of the most pressing questions in cyber extortion today.
In this month's reboot of the SANS Stay Ahead of Ransomware live stream, we dove deep into one of the most pressing questions in cyber extortion today: Are ransomware victims paying more or less often, and what factors drive these trends?
Joined by special guest Allan Liska, aka the “Ransomware Sommelier” from Recorded Future, we discussed the complexities surrounding ransom demands, payments, and the shifting tactics of cyber extortion groups.
We kicked off the stream by reviewing some interesting data. While statistics show a significant increase in posts on ransomware groups' data leak sites (DLS) in early 2025 compared to previous years, we noted that this doesn't automatically equate to more successful attacks overall.
A key factor is the rise of data-leak-only attacks, where threat actors steal data and threaten to release it without encrypting systems. We discussed how this blurs the lines of traditional ransomware and how the term "cyber extortion" (which we use in our FOR528 course title) better captures the full scope of these incidents. Allan noted that an increase in DLS posts could indicate that fewer victims are paying the initial ransom, forcing actors to follow through on their leak threats more often.
Despite the noise on DLS sites, we explored compelling evidence suggesting a decline in actual ransom payments. We highlighted reports from both Coveware and Chainalysis:
We discussed what may have attributed to this potential decline:
We addressed whether the changing landscape means attackers are shifting focus. Allan confirmed increased attacks targeting small-to-medium businesses (SMBs) and mid-market organizations. These groups are often more vulnerable due to fewer security resources and lack of robust backups, potentially making them more likely to pay smaller ransoms.Phishing and Social Engineering Remain Dominant: Allan noted the use of AI to craft more convincing phishing messages in diverse languages, targeting previously less-attacked regions. We also discussed the rise of sophisticated social engineering, like the "ClickFix" technique, which tricks users into executing malicious commands via the Windows Run prompt (Windows+R, Ctrl+V, Enter). Allan also mentioned AI voice-changing technology, enabling more convincing phone-based social engineering scams globally. Initial Infection Vectors
Initial access methods remain critical. While traditional vectors like remote desktop protocol (RDP) and software vulnerabilities persist, we highlighted:
Make sure to join us on the first Tuesday of next month at 1:00 PM Eastern and mark your calendars for our upcoming SANS events:
Mari DeGrazia loves the satisfaction of solving a good puzzle. That fascination paired with her technical abilities has made digital forensics the perfect career fit. "There is nothing like the adrenaline rush of figuring out a tough case when you find that smoking gun or vital clue that will help solve it," she says.
Read more about Mari DeGrazia