← Back to hub

Lateral Movement Post-Firewall Compromise — Interlock Ransomware Pattern

Detects remote execution of administration tools after perimeter device compromise, consistent with Interlock ransomware TTPs that exploit enterprise firewalls as an initial access vector as documented by Amazon threat intelligence

🔒

Premium Content

This query requires an active subscription to access the code.

Get Access