Ransomware Tactics, Techniques and Procedures (TTPs)



Sponsored by Hudson RockUse Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are impacting your business



TTPs analyze how a malicious actor operates, they describe how cyber attackers orchestrate, execute and manage operational attacks. TTPs contextualize a threat. They reveal the steps or actions taken by malicious actors when exfiltrating data, for example.


 8base 
 Akira 
 Alphv 
 Bianlian 
 Blackbasta 
 Braincipher 
 Cactus 
 Clop 
 Crosslock 
 Cuba 
 Donex 
 Dragonforce 
 Hunters 
 Medusa 
 Ransomhub 
 Royal 
 Safepay 
 Threeam