The realities of ransomware: Five signs you’re about to be attacked

Image of Peter Mackenzie. (Supplied)
Short Url
Updated 20 January 2021
Follow

The realities of ransomware: Five signs you’re about to be attacked

Whenever we work with ransomware victims, we spend some time looking back through our telemetry records that span the previous week or two. These records sometimes include behavioral anomalies that (on their own) may not be inherently malicious, but in the context of an attack that has already taken place, could be taken as an early indicator of a threat actor conducting operations on the victim’s network.

If we see any of these five indicators, in particular, we jump on them straight away. Any of these found during an investigation is almost certainly an indication that attackers have poked around: To get an idea of what the network looks like, and to learn how they can get the accounts and access they need to launch a ransomware attack.

Attackers use legitimate admin tools to set the stage for ransomware attacks. Without knowing what tools administrators normally use on their machines, one could easily overlook this data. In hindsight, these five indicators represent investigative red flags:

1. A network scanner, especially on a server

Attackers typically start by gaining access to one machine where they search for information: Is this a Mac or Windows, what’s the domain and company name, what kind of admin rights does the computer have, and more. Next, attackers will want to know what else is on the network and what can they access. The easiest way to determine this is to scan the network. If a network scanner, such as AngryIP or Advanced Port Scanner, is detected, question admin staff. If no one cops to using the scanner, it is time to investigate.

2. Tools for disabling antivirus software

Once attackers have admin rights, they will often try to disable security software using applications created to assist with the forced removal of software, such as Process Hacker, IOBit Uninstaller, GMER, and PC Hunter. These types of commercial tools are legitimate, but in the wrong hands, security teams and admins need to question why they have suddenly appeared.

3. The presence of MimiKatz

Any detection of MimiKatz anywhere should be investigated. If no one on an admin team can vouch for using MimiKatz, this is a red flag because it is one of the most commonly used hacking tools for credential theft. Attackers also use Microsoft Process Explorer, included in Windows Sysinternals, a legitimate tool that can dump LSASS.exe from memory, creating a .dmp file. They can then take this to their own environment and use MimiKatz to safely extract usernames and passwords on their own test machine.

4. Patterns of suspicious behavior

Any detection happening at the same time every day, or in a repeating pattern is often an indication that something else is going on, even if malicious files have been detected and removed. Security teams should ask “why is it coming back?” Incident responders know it normally means that something else malicious has been occurring that hasn’t (as of yet) been identified.

5. Test attacks

Occasionally, attackers deploy small test attacks on a few computers in order to see if the deployment method and ransomware executes successfully, or if security software stops it. If the security tools stop the attack, they change their tactics and try again. This will show their hand, and attackers will know their time is now limited. It is often a matter of hours before a much larger attack is launched.

Sophos’ next-gen cybersecurity solutions to stop ransomware

Sophos offers layered IT security for defending against the latest ransomware. Sophos not only provides best protection at every point, but also provides threat intelligence sharing between all these security points with synchronized security.

Sophos XG Firewall prevents attacks from getting onto a network. In the event ransomware does happen to get onto a network, Sophos XG Firewall can automatically stop ransomware dead in its tracks thanks to integration with Sophos Intercept X.

Sophos Intercept X Advanced with EDR includes anti-ransomware technology that detects malicious encryption processes and shuts them down before they can spread across the network. 

The Sophos Managed Threat Response (MTR) service adds human expertise to an organization’s layered security strategy. An elite team of threat hunters proactively look for and validate potential threats, and then take action to disrupt, contain and neutralize attacks. 


LuLu marks Founding Day with ‘Made in Saudi’ campaign

Updated 25 February 2026
Follow

LuLu marks Founding Day with ‘Made in Saudi’ campaign

The Ministry of Industry and Mineral Resources honored LuLu Hypermarket in recognition of its pivotal role as the exclusive retail partner of the “Najoud Bikhairna 2026” initiative, commending its continued efforts in supporting and empowering national industries while showcasing the quality and competitiveness of locally manufactured products.

The initiative, led by the ministry in partnership with the Saudi Export Development Authority, represented by the Made in Saudi program, stands as a pioneering model of public-private sector collaboration in activating community-driven initiatives with sustainable impact. Through this program, more than 280,000 Saudi-made products were distributed to 10,000 families across various regions of the Kingdom during the holy month of Ramadan, reinforcing the presence of national products and strengthening the values of social solidarity among individuals and institutions alike.
The ministry’s recognition of LuLu Hypermarket coincided with the official launch of its Saudi Founding Day celebrations at the Dharat Laban branch in Riyadh, marked by the unveiling of a comprehensive promotional campaign dedicated to Saudi-made products. On this occasion, a wide range of special offers was introduced on local products, available across all LuLu Hypermarket branches throughout the Kingdom.
The inauguration ceremony was attended by Mohammed bin Dayel, general supervisor of the Made in Saudi program at the Saudi Export Development Authority, and Mohamed Haris, director of LuLu Saudi Arabia, alongside members of LuLu’s executive management team. The event featured a ribbon-cutting ceremony to officially open the specially designed Founding Day gateway.
Following the inauguration, guests toured several dedicated zones and exhibitions highlighting national products. The tour commenced at the grocery and “Made in Saudi” consumer goods sections, showcasing the diversity and quality of local brands. It also included the “Made in Saudi” dates pavilion, presenting a premium selection of the finest locally sourced dates in celebration of one of the Kingdom’s most iconic national symbols.
The visit continued to the fruits and vegetables section under the theme “From Our Land,” featuring an exceptional assortment of Saudi agricultural products, reflecting the richness and excellence of the local agricultural sector. Guests also explored the LuLu private label corner, which features products exclusively manufactured within the Kingdom for LuLu, reaffirming the company’s commitment to supporting local manufacturing.
The tour concluded with a presentation of “Made in Saudi” products within the chilled and frozen categories, underscoring the rapid growth and qualitative advancement of the Kingdom’s food manufacturing sector, and further reinforcing the strong market position and competitiveness of Saudi products.