The Evolution of Ransomware Entry Points: Why the Perimeter Isn’t the Perimeter Anymore
In Morphisec’s recent CTO Briefing: The State of Ransomware, CTO Michael Gorelik dissected a critical reality that every CISO and security leader must confront: ransomware attacks aren’t succeeding because attackers are getting louder—they’re succeeding because they’re getting quieter.
Modern ransomware campaigns blend stealth, social engineering, supply-chain exploitation, cloud misconfigurations, and sophisticated evasion techniques that bypass even the most advanced detection-based tools.
The Evolution of Entry Points: Why the Perimeter Isn’t the Perimeter Anymore
One of the strongest themes from the briefing was that initial access is no longer predictable.
Attackers don’t rely on a single-entry method—they exploit whatever misconfiguration, overlooked control, or human blind spot they can find.
Recent attack patterns show a dramatic rise in:
- SonicWall Configuration Theft and Cloud Backup Exploits
In the briefing, Michael detailed multiple real-world incidents where Akira ransomware actors abused SonicWall’s cloud backup feature (“MySonicWall”) to steal configuration files (EXP files) and reinfect environments—even after the victim believed they had contained the attack.
This aligns with Morphisec’s broader findings that attackers increasingly abuse legitimate tools and management consoles, rather than brute-forcing entry. - Unpatched FortiGate Appliances
Keeling ransomware affiliates continue to exploit older Fortinet vulnerabilities—particularly those left unpatched in smaller IT environments or MSP-managed networks.
Attackers know that network appliances and boundary devices lag behind endpoint updates. - Social Engineering Through Microsoft Teams
Michael highlighted a troubling trend: Teams-based pretexting where attackers impersonate internal IT staff to convince employees to install Quick Assist or remote-control tools.
This technique bypasses email security entirely and takes advantage of environments that allow external Teams communication. - Trusted Tools Turned Against You
The kill chain is increasingly built on legitimate IT tools used in unintended ways:- Advanced IP Scanner
- Nmap / ZenMap
- PowerShell
- RClone
- Azure Copy
- Backup software APIs
Attackers don’t break in—they walk in using the same tools your IT team relies on.
Persistence and Backdoors: Attackers Don’t Come Alone Anymore
Another core insight from the webinar: modern ransomware isn’t a single sequence; it’s a mesh. Attackers establish multiple overlapping backdoors so that even if you close one entry point, another one stays live.
Recent investigations have uncovered:
- ScreenConnect Persistence via Authentication Packages — Attackers hijack authentication packages to run ScreenConnect at the OS level, hidden beneath standard user activity. This makes it extremely difficult for EDR tools to flag malicious sessions.
- Portable Node.js and Java Bundles —Attackers drop portable, self-contained Node.js or Java environments—including all dependencies—to create lightweight backdoors without requiring installation. They behave like legitimate software processes, making behavioral detection nearly impossible.
- Shadow Infrastructure —Michael detailed scenarios where attackers build:
- Hidden virtual machines
- Isolated encryption environments
- Side-channel data transfer paths
… allowing them to evade all endpoint-based security.
This reinforces what Morphisec highlights in its What Is Anti-Ransomware? guide:
attackers are no longer trying to “beat” your EDR—they’re operating outside its scope entirely.
Defense Evasion: The Quiet Engine of Ransomware Success
The briefing emphasized that ransomware succeeds because attackers can evade, not because encryption tools are sophisticated. Modern evasion tactics make ransomware payloads the least interesting part of the attack.
Key trends include:
- Safe Mode Encryption —Many EDR tools—including leading solutions—are partially or completely inactive in safe mode. Attackers simply reboot a host into safe mode and run encryption unchallenged.
- Telemetry Suppression — Attackers tamper with:
- ETW (Event Tracing for Windows)
- Kernel callbacks
- Security agent notification channels
- Behavioral monitoring hooks
Without telemetry, detection tools see nothing.
- BYOVD (Bring Your Own Vulnerable Driver)— Even with Microsoft expanding blocklists, attackers continue to abuse signed but vulnerable drivers to gain kernel-level access and tamper with security controls.
- Golang and Rust-Based Encryptors— High-level languages used for custom encryptors:
- evade signature-based detection
- operate without traditional hooking
- compile into lightweight, static binaries
This last trend reinforces Michael’s statement in the briefing: “There is no ransomware event without evasion. Evasion is the backbone of every modern attack.”
Why Detection Alone Isn’t Enough
The briefing’s most important strategic message was that detection-based security can’t keep up. Even organizations with best-in-class EDR and MDR tools continue to experience ransomware breaches.
This reinforces a core Morphisec principle seen across multiple articles:
- Ransomware is too fast for detection
- The kill chain is too dynamic to identify in real time
- The focus must shift to preemptive prevention
Stopping ransomware requires preventing the attack chain—not waiting to detect malicious activity mid-execution.”
What CISOs Can Do Now: Practical Takeaways from the Briefing
- Reduce your EDR blind spots.
Non-agent assets—appliances, NAS devices, QNAPs, gateways—are prime targets. - Harden remote collaboration tools.
Disable external Teams calls by default. Monitor remote admin tool usage. - Treat ransomware as a business problem.
Attackers choose victims based on business impact and payout potential. - Prioritize preemptive protection.
Deception technology and moving target defense stop attackers before they can execute or persist—closing the gaps where detection fails. - Validate all backup assumptions.
Backups are one of the most commonly exploited weaknesses. Test recovery quarterly.
A New Era of Ransomware Requires a New Era of Defense
The ransomware kill chain of 2025 is quieter, more adaptive, and more evasive than anything seen in previous years. Attackers don’t break in—they infiltrate through misconfigurations, trusted tools, and human gaps. They don’t just encrypt—they blind your tools first. And they don’t rely on malware—they rely on your environment.
Learn how attackers are bypassing controls—and how preemptive defense stops them. For a full breakdown of the kill chain, including real incident deep dives and predictions for 2026, watch the complete CTO briefing.
Stay up-to-date
Get the latest resources, news, and threat research delivered to your inbox.