Category: Ransomware Articles

Where do the billions of dollars extorted by ransomware criminals end up? Obviously, that cryptocurrency ends up in someone’s bank account before reappearing in the tills of luxury watch shops, sports car dealerships, and five-star resorts around the globe, as criminals spend the proceeds. To make that jump from the virtual to the physical, the […]

There is a lot of excellent advice readily available about how to protect against ransomware attacks. But the unfortunate truth for many organizations is that, much like Alanis Morrissette, it is “…the good advice that you just didn’t take.” A lot of ransomware protection advice is aimed at organizations with a large enough security budget […]

Ransomware, at its core, is structured to be as loud as possible. Threat actors rely on the ability to impact as many systems as possible, as quickly as possible, to incentivize their victims to pay the asking demand to get back up and running as fast as they can. While there are many different threat […]

Europe just experienced a smaller but still alarming version of last May’s Colonial Pipeline attack in the U.S., as two large German fuel storage companies were taken offline by ransomware. The Jan. 29 attack targeted Oiltanking GmbH Group and Mabanaft GmbH & Co. KG Group, which operates fuel storage facilities as subsidiaries of the logistics […]

Let’s take a look at the ways an RDP ransomware attack occurs, from the most obvious to the more subtle. The Brute Force Attack: Ransomware via Attrition Brute force attacks are an extremely popular method through which an attacker can deploy ransomware (such as Maze) via RDP. First, the attacker scans the Internet until they […]

Mobile phones are certainly ubiquitous—85% of Americans currently own a smartphone, and in 2020, 3.5 billion people owned a smartphone worldwide. With so many devices out there, it seems like mobile would be an excellent target for ransomware threat actors. However, we don’t hear a lot about devastating ransomware attacks targeting smartphone operating systems, like […]