1 in 7 Ransomware Extortion Leaks Include Sensitive Operational Technology Details



New analysis of published data from ransomware attacks puts the spotlight on the potential that some of your most critical data stolen puts you materially at risk of another attack.

Anyone feel like publishing their usernames and passwords, IP addresses, remote service details, asset tags, original equipment manufacturer (OEM) information, or network diagrams? No one in their right mind would put any of this information out for public consumption.

But, according to the security analysts at Mandiant Intelligence, 1 out of every 7 ransomware attacks that include the theft of sensitive data as part of an extortion scheme that gets published includes much of the data I just mentioned. We’ve recently seen a massive jump of 953% (not a typo!) in ransomware attacks that publish victim data, which only helps make this including of sensitive operational technology information more dangerous to victim organizations.

This is truly concerning.

The information above can easily be used by hackers intent on infiltrating your network and moving laterally within it. The data types I mentioned above were found by Mandiant when they searched through published data in 2021.

This news makes it clear that organization cannot afford a ransomware attack and the assumed aftermath of exfiltrated data – something that occurs in 83% of all ransomware attacks. Phishing still remains a primary initial attack vector, putting Security Awareness Training at the top of the list for security initiatives that empower users to play a role in stopping attacks that make it past security solutions all the way to the Inbox.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews