
Date: 12th September 2025 - 11:00 a.m
One missed alert. One seemingly harmless phone call.
One month later: encrypted systems, stolen data,
and an organisation in turmoil.
During this virtual session, we walk through the full timeline of a real ransomware attack investigated by our incident response team. This isn’t theory – it’s the real timeline as it happened: minute by minute, decision by decision.
You’ll see how a seemingly minor security gap opened the door escalated into a major breach.
We’ll cover how the attackers gained access, moved laterally through the environment, leveraged internal tools, and identify the key moments where earlier detection or intervention could have made a critical difference.
What you'll learn:
- Initial access: How social engineering (including vishing and fake IT support calls) enabled the initial foothold. What happened in the hours that followed?
- Compromise: What early warning signs were present but overlooked? Which patterns of activity pointed to an impending attack?
- Privilege escalation and lateral movement: What tools and techniques did the attackers use to remain undetected while moving through the environment?
- Ransomware deployment and data exfiltration: What decisions were made under pressure, and how did timing and coordination affect the response?
We’ll also provide context around the ecosystem behind the attack:
- How Ransomware-as-a-Service works in practice
- The roles of affiliates, initial access brokers, and infrastructure suppliers
- Why these attacks are no longer isolated incidents, but part of a functioning cybercrime economy
Trend Micro respects your privacy. Read our privacy policy.
Who should attend:
Security leaders, blue teams, SOC analysts, and anyone responsible for detection, response, or crisis management. If you want a clear understanding of how ransomware attacks really play out – this session is for you.
Outcome:
If the time doesn’t work for you or something urgent comes up, it’s still worth registering
you can always watch it on-demand later.
Speaker 3 name
Speaker 3 title
Speaker 3 bio
Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.