Date: 12th September 2025 - 11:00 a.m

One missed alert. One seemingly harmless phone call.
One month later: encrypted systems, stolen data,
and an organisation in turmoil.

During this virtual session, we walk through the full timeline of a real ransomware attack investigated by our incident response team. This isn’t theory – it’s the real timeline as it happened: minute by minute, decision by decision.

You’ll see how a seemingly minor security gap opened the door escalated into a major breach.

We’ll cover how the attackers gained access, moved laterally through the environment, leveraged internal tools, and identify the key moments where earlier detection or intervention could have made a critical difference.

What you'll learn:

  • Initial access: How social engineering (including vishing and fake IT support calls) enabled the initial foothold. What happened in the hours that followed?
  • Compromise: What early warning signs were present but overlooked? Which patterns of activity pointed to an impending attack?
  • Privilege escalation and lateral movement: What tools and techniques did the attackers use to remain undetected while moving through the environment?
  • Ransomware deployment and data exfiltration: What decisions were made under pressure, and how did timing and coordination affect the response?

We’ll also provide context around the ecosystem behind the attack:

  • How Ransomware-as-a-Service works in practice
  • The roles of affiliates, initial access brokers, and infrastructure suppliers
  • Why these attacks are no longer isolated incidents, but part of a functioning cybercrime economy

Trend Micro respects your privacy. Read our privacy policy.

Who should attend:

Security leaders, blue teams, SOC analysts, and anyone responsible for detection, response, or crisis management. If you want a clear understanding of how ransomware attacks really play out – this session is for you.

Outcome:

After this webinar, you'll walk away with a realistic view of how ransomware operators operate, which warning signs often go unnoticed, and what response decisions matter most when every minute counts.

If the time doesn’t work for you or something urgent comes up, it’s still worth registering
you can always watch it on-demand later.

Robert Wortmann

Security Strategist at Trend Micro

Speaker 2 bio

Speaker 3 name

Speaker 3 title

Speaker 3 bio

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.