Jessica Payne (@jepaynemsft) 's Twitter Profile
Jessica Payne

@jepaynemsft

Security Person at Microsoft, currently in Windows Defender Security Research. Opinions are my own.

ID: 3937965861

linkhttps://aka.ms/jessica calendar_today12-10-2015 14:57:35

979 Tweet

30,30K Followers

32 Following

Jessica Payne (@jepaynemsft) 's Twitter Profile Photo

Threat Intelligence reports often ignore ‘commodity’ threats, or fail to explain how a threat can be prevented. We think differently, and want you to know how the most impactful threats work and how you can stop them. Stopping Ransomware is possible, with built in configurations.

Jessica Payne (@jepaynemsft) 's Twitter Profile Photo

Credential theft, lateral movement, data exfiltration -terms many don’t associate with ransomware. But that is what happens during these attacks and the mindset needs to shift. Paying a ransom doesn’t remove the attacker, and formatting a ransomed machine doesn’t undo the attack.

Jessica Payne (@jepaynemsft) 's Twitter Profile Photo

An insufficiently secured network is distributed computing resources to an attacker. If you have no host firewalls, matching local admin passwords, services that log in as highly privileged accounts and haven’t had an attack yet- it’s likely just because you weren’t selected.

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Multiple ransomware groups that have been accumulating access and maintaining persistence on target networks for several months activated dozens of ransomware deployments in the first two weeks of April. msft.it/6011Tg9Lx