Initial access vectors are the methods threat actors use to first gain access to an organization’s systems. They can include exploitation of vulnerabilities, stolen credentials, phishing, or brute-forcing services like RDP or SSH. Many of these accesses can be purchased from threat actors who specialize in obtaining initial access, known as Initial Access Brokers. The […]
The war between Ukraine and Russia has disrupted the business model of ransomware attackers, or so it’s said. It’s an idea that’s been discussed since the war began in February, and now we have some official confirmation that perhaps this isn’t entirely wishful thinking. The venue was the recent U.K. National Cyber Security Centre’s CYBERUK […]
We all must work toward building a knowledgebase to address the growing threat of ransomware. Our increasing reliance on technology as a society makes it imperative that each of us understands how to detect, prevent, or remediate a ransomware threat. The nature of ransomware attacks now goes beyond trivial damages; these attacks are now capable […]
Ransomware moves fast—so fast that there’s a new statistic that security companies are using, called “Time-to-Ransom,” or TTR. This can be defined as the time between initial compromise of the first system and the execution of ransomware. Ransomware executables, for example, can be programmed to worm through environments using system exploits like BlueKeep or leveraging […]
A series of ransomware attacks against Costa Rican national infrastructure has prompted the country’s new president to declare a national emergency. First reported by BleepingComputer, the president, Rodrigo Chaves, made the declaration on May 8, the same day he took office. The attacks have been allegedly carried out by the Conti ransomware group, currently viewed […]
They’re baaaccckkkk. The notorious ransomware gang REvil has popped up on the radar again, after a rough early 2022 that saw multiple members arrested by authorities. Regular ransomware watchers will remember REvil’s heyday, which wasn’t that long ago. In a previous article, Ransomware.org highlighted their greatest hits, featuring the most famous ransomware attack of all. […]