Ransomware is supposed to be about money, and only money. This view is backed by plenty of evidence. Almost without exception, ransomware attacks are commercial events rather than ones motivated by ideological or hacktivist aims. Despite this, every now and again exceptions pop up that counter this idea in ways that send ransomware analysts back […]
In November 2019, companies across the United States started receiving the following poorly written but still threatening email: In the past day we have come across data pertaining to company you work for: [company name]. Data contains all personal identifiable information for every employee that works for this company including yourself. Data was leaked around […]
Ferrari, the world-famous makers of elite sports cars, just suffered a significant data breach caused by ransomware. The news emerged in an apologetic letter sent in English to customers on March 20: “We regret to inform you of a cyber incident at Ferrari where a threat actor was able to access a limited number of […]
On Jan. 10, Britain’s Royal Mail was hit by a ransomware attack that will probably be used as an example in security conference slide presentations for years to come. On the surface, this was a fairly standard ransomware attack on a large company—in this case, the overseas mail department of a company that delivers around […]
Even by its own grim standards, the last two years have been a remarkable time for the ransomware industry. Incidents have become ever more spectacular, while the ransoms being demanded have grown larger, sometimes to almost incredible levels. Innovations, meanwhile, have come thick and fast, including targeting critical infrastructure on a significant scale and encrypting […]
How do today’s ransomware attackers find a way in? In truth, there are numerous routes, some more obvious than others. The key for ransomware attackers is to find an initial staging post. Often this is an employee—or more specifically, the employee’s network credentials—grabbed after a phishing attack. In other cases, it’s about finding an external […]
A REVEALING REPORT FOR IT PROFESSIONALS BY IT PROFESSIONALS