Ransomware groups have shifted from the automated, ‘spray and pray’ tactics of yesterday to highly targeted, human-operated ransomware attacks, carefully crafted to find and encrypt your data and cause maximum critical service disruption.
As ransomware attacks surge and hackers become increasingly bold, the Biden administration is forging ahead with a package of new measures that includes up to $10 million for information that leads to the identification of attackers that hit critical infrastructure.
President Joe Biden warned Vladimir Putin that there would be consequences for ransomware attacks launched from Russia even if they were not sanctioned by the Kremlin.
Ransomware attacks and cloud security are two of the most persistent cyber defense issues today. CISA is taking a major step in expanding public-private partnerships with a new initiative.
Devaluing data makes the information meaningless to bad actors regardless of how much data and which type of data is exfiltrated. This strategy prevents fraudsters from holding your data hostage during ransomware attacks — even if bad actors bypass your security measures, they can’t sell or expose the information.
Conti is able to breeze through ransomware attacks in as little as three days thanks to a polished setup that has been years in the making: custom ransomware and tools, a disciplined working schedule and a business-like structure.
Conti ransomware group has transformed from lone wolves into a globe-spanning pack of well-organized criminals disrupting and casting into disarray government entities, private organizations, and small and medium-sized businesses.
2020 and 2021 were record years for ransomware payments at about $765 million. The take collected by ransomware operators is now down 40% to $457 million in 2022.
As major ransomware attacks continue to be an almost-weekly news item, companies up for policy renewal are getting an unpleasant surprise. Reinsurance broker Wills Re reports that cyber reinsurance rates are up by as much as 40% across the industry.
Suspects affiliated with a ransomware-as-a-service (RaaS) platform used in LockerGoga, MegaCortex, and Dharma ransomware attacks were detained in Ukraine and Switzerland.