The Evolution of Ransomware Entry Points: Why the Perimeter Isnโt the Perimeter Anymore
In Morphisecโs recent CTO Briefing: The State of Ransomware, CTO Michael Gorelik dissected a critical reality that every CISO and security leader must confront: ransomware attacks arenโt succeeding because attackers are getting louderโtheyโre succeeding because theyโre getting quieter.
Modern ransomware campaigns blend stealth, social engineering, supply-chain exploitation, cloud misconfigurations, and sophisticated evasion techniques that bypass even the most advanced detection-based tools. โฏ
The Evolution of Entry Points: Why the Perimeter Isnโt the Perimeter Anymore โฏ
One of the strongest themes from the briefing was that initial access is no longer predictable.
Attackers donโt rely on a single-entry methodโthey exploit whatever misconfiguration, overlooked control, or human blind spot they can find. โฏ
Recent attack patterns show a dramatic rise in: โฏ
- SonicWall Configuration Theft and Cloud Backup Exploits
In the briefing, Michael detailed multiple real-world incidents where Akira ransomware actors abused SonicWallโs cloud backup feature (โMySonicWallโ) to steal configuration files (EXP files) and reinfect environmentsโeven after the victim believed they had contained the attack.
This aligns with Morphisecโs broader findings that attackers increasingly abuse legitimate tools and management consoles, rather than brute-forcing entry. - Unpatched FortiGate Appliances
Keeling ransomware affiliates continue to exploit older Fortinet vulnerabilitiesโparticularly those left unpatched in smaller IT environments or MSP-managed networks.
Attackers know that network appliances and boundary devices lag behind endpoint updates. - Social Engineering Through Microsoft Teams
Michael highlighted a troubling trend: Teams-based pretexting where attackers impersonate internal IT staff to convince employees to install Quick Assist or remote-control tools.
This technique bypasses email security entirely and takes advantage of environments that allow external Teams communication. - Trusted Tools Turned Against You
The kill chain is increasingly built on legitimate IT tools used in unintended ways:- Advanced IP Scanner
- Nmap / ZenMap
- PowerShell
- RClone
- Azure Copy
- Backup software APIs
โฏAttackers donโt break inโthey walk in using the same tools your IT team relies on. โฏ
Persistence and Backdoors: Attackers Donโt Come Alone Anymoreโฏ
Another core insight from the webinar: modern ransomware isnโt a single sequence; itโs a mesh. Attackers establish multiple overlapping backdoors so that even if you close one entry point, another one stays live. โฏ
Recent investigations have uncovered: โฏ
- ScreenConnect Persistence via Authentication Packages โ Attackers hijack authentication packages to run ScreenConnect at the OS level, hidden beneath standard user activity. This makes it extremely difficult for EDR tools to flag malicious sessions. โฏ
- Portable Node.js and Java Bundles โAttackers drop portable, self-contained Node.js or Java environmentsโincluding all dependenciesโto create lightweight backdoors without requiring installation. They behave like legitimate software processes, making behavioral detection nearly impossible. โฏ
- Shadow Infrastructure โMichael detailed scenarios where attackers build:
- Hidden virtual machines
- Isolated encryption environments
- Side-channel data transfer paths
โฏ โฆ allowing them to evade all endpoint-based security.
โฏThis reinforces what Morphisec highlights in its What Is Anti-Ransomware? guide:
attackers are no longer trying to โbeatโ your EDRโtheyโre operating outside its scope entirely. โฏ
Defense Evasion: The Quiet Engine of Ransomware Success
โฏThe briefing emphasized that ransomware succeeds because attackers can evade, not because encryption tools are sophisticated. Modern evasion tactics make ransomware payloads the least interesting part of the attack. โฏ
Key trends include:
- Safe Mode Encryption โMany EDR toolsโincluding leading solutionsโare partially or completely inactive in safe mode. Attackers simply reboot a host into safe mode and run encryption unchallenged.
- Telemetry Suppression โ Attackers tamper with:
- ETW (Event Tracing for Windows)
- Kernel callbacks
- Security agent notification channels
- Behavioral monitoring hooks
Without telemetry, detection tools see nothing.
- BYOVD (Bring Your Own Vulnerable Driver)โ Even with Microsoft expanding blocklists, attackers continue to abuse signed but vulnerable drivers to gain kernel-level access and tamper with security controls.
- Golang and Rust-Based Encryptorsโ High-level languages used for custom encryptors:
- evade signature-based detection
- operate without traditional hooking
- compile into lightweight, static binaries
This last trend reinforces Michaelโs statement in the briefing: โThere is no ransomware event without evasion. Evasion is the backbone of every modern attack.โ โฏ
Why Detection Alone Isnโt Enough โฏ
The briefingโs most important strategic message was that detection-based security canโt keep up. Even organizations with best-in-class EDR and MDR tools continue to experience ransomware breaches. โฏ
This reinforces a core Morphisec principle seen across multiple articles: โฏ
- Ransomware is too fast for detection
- The kill chain is too dynamic to identify in real time
- The focus must shift to preemptive prevention
Stopping ransomware requires preventing the attack chainโnot waiting to detect malicious activity mid-execution.โ โฏ
What CISOs Can Do Now: Practical Takeaways from the Briefing โฏ
- Reduce your EDR blind spots.
Non-agent assetsโappliances, NAS devices, QNAPs, gatewaysโare prime targets. - Harden remote collaboration tools.
Disable external Teams calls by default. Monitor remote admin tool usage. - Treat ransomware as a business problem.
Attackers choose victims based on business impact and payout potential. - Prioritize preemptive protection.
Deception technology and moving target defense stop attackers before they can execute or persistโclosing the gaps where detection fails. - Validate all backup assumptions.
Backups are one of the most commonly exploited weaknesses. Test recovery quarterly.
A New Era of Ransomware Requires a New Era of Defense
The ransomware kill chain of 2025 is quieter, more adaptive, and more evasive than anything seen in previous years. Attackers donโt break inโthey infiltrate through misconfigurations, trusted tools, and human gaps. They donโt just encryptโthey blind your tools first. And they donโt rely on malwareโthey rely on your environment.
Learn how attackers are bypassing controlsโand how preemptive defense stops them. For a full breakdown of the kill chain, including real incident deep dives and predictions for 2026, watch the complete CTO briefing.
Stay up-to-date
Get the latest resources, news, and threat research delivered to your inbox.