{"id":46451,"date":"2022-02-08T03:35:00","date_gmt":"2022-02-08T08:35:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46451"},"modified":"2022-02-08T03:35:00","modified_gmt":"2022-02-08T08:35:00","slug":"one-in-seven-ransomware-extortion-attempts-leak-key-operational-tech-records","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2022\/02\/08\/one-in-seven-ransomware-extortion-attempts-leak-key-operational-tech-records\/","title":{"rendered":"One in seven ransomware extortion attempts leak key operational tech records"},"content":{"rendered":"\n<p><br>While the ransom itself is certainly painful, the actual data that is publicly compromised via the &#8220;name and shame&#8221; sites is the true exposure to organizations. <\/p>\n\n\n\n<p>Written by\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/us\/charlie-osborne\/\">Charlie Osborne<\/a> &#8211; One in seven <strong>ransomware <\/strong>extortion data leaks reveals business-critical operational technology data, researchers say.\u00a0<\/p>\n\n\n\n<p><strong>Ransomware<\/strong> has evolved from barebone encryption and basic demands for payment into something potentially far more severe in recent years.\u00a0<\/p>\n\n\n\n<p>Once, <strong>ransomware <\/strong>was used en masse to infect systems and extort blackmail payments from the general public &#8212; normally in cryptocurrency such as Bitcoin (BTC) &#8212; but now, operators are targeting high-value targets for larger payoffs.\u00a0<\/p>\n\n\n\n<p>In what some cybersecurity experts call &#8220;big game hunting,&#8221; <strong>ransomware<\/strong> groups go for large enterprise firms, utilities, hospitals, and key supply chain players.\u00a0<\/p>\n\n\n\n<p>While it may take longer to perform the reconnaissance required to enter networks owned by large companies, once entry has been obtained, it is possible that one attack can land them millions of dollars.&nbsp;<\/p>\n\n\n\n<p><a rel=\"noreferrer noopener\" href=\"https:\/\/www.zdnet.com\/article\/colonial-pipeline-ransomware-attack-everything-you-need-to-know\/\" target=\"_blank\">Colonial Pipeline<\/a>\u00a0is an example of just how debilitating a <strong>ransomwar<\/strong>e attack can be. The fuel supplier&#8217;s systems were hijacked by <strong>ransomware<\/strong> in 2021 by DarkSide, and while a $4.4 million ransom was paid to restore Colonial Pipeline&#8217;s network, the damage was already done &#8212; the attack prompted panic buying and fuel shortages across the United States.\u00a0  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/one-in-seven-ransomware-extortion-attempts-leak-key-business-operation-data\/&amp;ct=ga&amp;cd=CAEYACoUMTgwNDI5NDgzNjUwNDU2NTk3MDgyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNGz9Ol5D9P_DfGiXj-8oatMfvHnCA\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the ransom itself is certainly painful, the actual data that is publicly compromised via the &#8220;name and shame&#8221; sites is the true exposure to organizations. Written by\u00a0Charlie Osborne &#8211; One in seven ransomware extortion data leaks reveals business-critical operational <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2022\/02\/08\/one-in-seven-ransomware-extortion-attempts-leak-key-operational-tech-records\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46452,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-46451","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46451"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46451\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}