{"id":34410,"date":"2020-07-08T02:39:00","date_gmt":"2020-07-08T06:39:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=34410"},"modified":"2020-07-08T02:39:00","modified_gmt":"2020-07-08T06:39:00","slug":"ransomware-has-a-new-and-very-valuable-hostage-in-sight","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/07\/08\/ransomware-has-a-new-and-very-valuable-hostage-in-sight\/","title":{"rendered":"Ransomware Has A New And Very Valuable Hostage In Sight"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.forbes.com\/sites\/bobzukis\/\">Bob Zukis<\/a> &#8211; Cybercriminals have figured out that fencing stolen data is a lot more work than just holding it hostage. It also doesn&#8217;t pay as well. <strong>Ransomware<\/strong> is a rapidly growing cyber threat, and attacks overall were\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.cisomag.com\/ransomware-attacks-rise-q1-2020\/\" target=\"_blank\">up 25% in Q1.<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2020\/01\/07\/09\/33\/matrix-4747148__340.jpg\" alt=\"\" width=\"652\" height=\"367\"\/><\/figure><\/div>\n\n\n\n<p><strong>Ransomware<\/strong> continues to proliferate as an effective cybersecurity threat because it works. It gets hackers paid.\u00a0<\/p>\n\n\n\n<p>The average <strong>ransomware <\/strong>payment is up 33% from Q4 of 2019 to $111,605. But the real cost is the impact on business, such as lost revenue or employee productivity or the impact to public services. The average business downtime due to a <strong>ransomware <\/strong>attack is 15 days.\u00a0<\/p>\n\n\n\n<p>The city of Florence, Alabama, was hit on June 5<sup>th<\/sup>\u00a0with a <strong>ransomware<\/strong> attack and hackers demanded $300,000, which city officials said\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/krebsonsecurity.com\/2020\/06\/florence-ala-hit-by-ransomware-12-days-after-being-alerted-by-krebsonsecurity\/\" target=\"_blank\">they&#8217;d likely pay to keep<\/a>\u00a0their citizens information off the internet.\u00a0 <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.forbes.com\/sites\/bobzukis\/2020\/06\/18\/ransomware-has-a-new-and-very-valuable-hostage-in-sight\/&amp;ct=ga&amp;cd=CAEYASoSODMwODk1MTMxNzI0ODA5ODg5MhpmOTVkN2Q1Nzc1OTJkZTIxOmNvbTplbjpVUw&amp;usg=AFQjCNFTOe9UrB59X1PRPM5XXlZUv0UTqw\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bob Zukis &#8211; Cybercriminals have figured out that fencing stolen data is a lot more work than just holding it hostage. It also doesn&#8217;t pay as well. Ransomware is a rapidly growing cyber threat, and attacks overall were\u00a0up 25% in <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/07\/08\/ransomware-has-a-new-and-very-valuable-hostage-in-sight\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-34410","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34410","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=34410"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/34410\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=34410"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=34410"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=34410"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}