One in seven ransomware extortion attempts leak key operational tech records
While the ransom itself is certainly painful, the actual data that is publicly compromised via the “name and shame” sites is the true exposure to organizations.
Written by Charlie Osborne – One in seven ransomware extortion data leaks reveals business-critical operational technology data, researchers say.
Ransomware has evolved from barebone encryption and basic demands for payment into something potentially far more severe in recent years.
Once, ransomware was used en masse to infect systems and extort blackmail payments from the general public — normally in cryptocurrency such as Bitcoin (BTC) — but now, operators are targeting high-value targets for larger payoffs.
In what some cybersecurity experts call “big game hunting,” ransomware groups go for large enterprise firms, utilities, hospitals, and key supply chain players.
While it may take longer to perform the reconnaissance required to enter networks owned by large companies, once entry has been obtained, it is possible that one attack can land them millions of dollars.
Colonial Pipeline is an example of just how debilitating a ransomware attack can be. The fuel supplier’s systems were hijacked by ransomware in 2021 by DarkSide, and while a $4.4 million ransom was paid to restore Colonial Pipeline’s network, the damage was already done — the attack prompted panic buying and fuel shortages across the United States. Read On:
Comments
One in seven ransomware extortion attempts leak key operational tech records — No Comments
HTML tags allowed in your comment: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>