The Evolution of Ransomware Entry Points: Why the Perimeter Isnβt the Perimeter Anymore
In Morphisecβs recent CTO Briefing: The State of Ransomware, CTO Michael Gorelik dissected a critical reality that every CISO and security leader must confront: ransomware attacks arenβt succeeding because attackers are getting louderβtheyβre succeeding because theyβre getting quieter.
Modern ransomware campaigns blend stealth, social engineering, supply-chain exploitation, cloud misconfigurations, and sophisticated evasion techniques that bypass even the most advanced detection-based tools. β―
The Evolution of Entry Points: Why the Perimeter Isnβt the Perimeter Anymore β―
One of the strongest themes from the briefing was that initial access is no longer predictable.
Attackers donβt rely on a single-entry methodβthey exploit whatever misconfiguration, overlooked control, or human blind spot they can find. β―
Recent attack patterns show a dramatic rise in: β―
- SonicWall Configuration Theft and Cloud Backup Exploits
In the briefing, Michael detailed multiple real-world incidents where Akira ransomware actors abused SonicWallβs cloud backup feature (βMySonicWallβ) to steal configuration files (EXP files) and reinfect environmentsβeven after the victim believed they had contained the attack.
This aligns with Morphisecβs broader findings that attackers increasingly abuse legitimate tools and management consoles, rather than brute-forcing entry. - Unpatched FortiGate Appliances
Keeling ransomware affiliates continue to exploit older Fortinet vulnerabilitiesβparticularly those left unpatched in smaller IT environments or MSP-managed networks.
Attackers know that network appliances and boundary devices lag behind endpoint updates. - Social Engineering Through Microsoft Teams
Michael highlighted a troubling trend: Teams-based pretexting where attackers impersonate internal IT staff to convince employees to install Quick Assist or remote-control tools.
This technique bypasses email security entirely and takes advantage of environments that allow external Teams communication. - Trusted Tools Turned Against You
The kill chain is increasingly built on legitimate IT tools used in unintended ways:- Advanced IP Scanner
- Nmap / ZenMap
- PowerShell
- RClone
- Azure Copy
- Backup software APIs
β―Attackers donβt break inβthey walk in using the same tools your IT team relies on. β―
Persistence and Backdoors: Attackers Donβt Come Alone Anymoreβ―
Another core insight from the webinar: modern ransomware isnβt a single sequence; itβs a mesh. Attackers establish multiple overlapping backdoors so that even if you close one entry point, another one stays live. β―
Recent investigations have uncovered: β―
- ScreenConnect Persistence via Authentication Packages β Attackers hijack authentication packages to run ScreenConnect at the OS level, hidden beneath standard user activity. This makes it extremely difficult for EDR tools to flag malicious sessions. β―
- Portable Node.js and Java Bundles βAttackers drop portable, self-contained Node.js or Java environmentsβincluding all dependenciesβto create lightweight backdoors without requiring installation. They behave like legitimate software processes, making behavioral detection nearly impossible. β―
- Shadow Infrastructure βMichael detailed scenarios where attackers build:
- Hidden virtual machines
- Isolated encryption environments
- Side-channel data transfer paths
β― β¦ allowing them to evade all endpoint-based security.
β―This reinforces what Morphisec highlights in its What Is Anti-Ransomware? guide:
attackers are no longer trying to βbeatβ your EDRβtheyβre operating outside its scope entirely. β―
Defense Evasion: The Quiet Engine of Ransomware Success
β―The briefing emphasized that ransomware succeeds because attackers can evade, not because encryption tools are sophisticated. Modern evasion tactics make ransomware payloads the least interesting part of the attack. β―
Key trends include:
- Safe Mode Encryption βMany EDR toolsβincluding leading solutionsβare partially or completely inactive in safe mode. Attackers simply reboot a host into safe mode and run encryption unchallenged.
- Telemetry Suppression β Attackers tamper with:
- ETW (Event Tracing for Windows)
- Kernel callbacks
- Security agent notification channels
- Behavioral monitoring hooks
Without telemetry, detection tools see nothing.
- BYOVD (Bring Your Own Vulnerable Driver)β Even with Microsoft expanding blocklists, attackers continue to abuse signed but vulnerable drivers to gain kernel-level access and tamper with security controls.
- Golang and Rust-Based Encryptorsβ High-level languages used for custom encryptors:
- evade signature-based detection
- operate without traditional hooking
- compile into lightweight, static binaries
This last trend reinforces Michaelβs statement in the briefing: βThere is no ransomware event without evasion. Evasion is the backbone of every modern attack.β β―
Why Detection Alone Isnβt Enough β―
The briefingβs most important strategic message was that detection-based security canβt keep up. Even organizations with best-in-class EDR and MDR tools continue to experience ransomware breaches. β―
This reinforces a core Morphisec principle seen across multiple articles: β―
- Ransomware is too fast for detection
- The kill chain is too dynamic to identify in real time
- The focus must shift to preemptive prevention
Stopping ransomware requires preventing the attack chainβnot waiting to detect malicious activity mid-execution.β β―
What CISOs Can Do Now: Practical Takeaways from the Briefing β―
- Reduce your EDR blind spots.
Non-agent assetsβappliances, NAS devices, QNAPs, gatewaysβare prime targets. - Harden remote collaboration tools.
Disable external Teams calls by default. Monitor remote admin tool usage. - Treat ransomware as a business problem.
Attackers choose victims based on business impact and payout potential. - Prioritize preemptive protection.
Deception technology and moving target defense stop attackers before they can execute or persistβclosing the gaps where detection fails. - Validate all backup assumptions.
Backups are one of the most commonly exploited weaknesses. Test recovery quarterly.
A New Era of Ransomware Requires a New Era of Defense
The ransomware kill chain of 2025 is quieter, more adaptive, and more evasive than anything seen in previous years. Attackers donβt break inβthey infiltrate through misconfigurations, trusted tools, and human gaps. They donβt just encryptβthey blind your tools first. And they donβt rely on malwareβthey rely on your environment.
Learn how attackers are bypassing controlsβand how preemptive defense stops them. For a full breakdown of the kill chain, including real incident deep dives and predictions for 2026, watch the complete CTO briefing.
Stay up-to-date
Get the latest resources, news, and threat research delivered to your inbox.