More Ransomware Creators Jump on the Leak Site Bandwagon as the Number of Sites and Data Breach Posts Skyrocket in Q3



Ransomware Data Breach SkyrocketThe third quarter saw massive increases in activity by ransomware gangs both creating leak sites and posting to them about recent attacks on orgs that, presumably, didn’t pay the ransom.

We’ve seen more and more interest in ransomware attacks turning into ransomware-turned-data-breach attacks and the use of the extortion of going public with the data breach as a means to further influence the victim organization to pay the ransom.

Security vendor Digital Shadows’ Quarterly Update: Ransomware Trends In Q3 highlights their findings as ransomware groups adopt similar tactics:

  • Maze, DoppelPaymer, and Sodinokibi made up 80% of alerts of the leak sites
  • Conti and NetWalker ransomware groups joined the ranks of those hosting a leak site
  • The number of leak sites by well-known ransomware groups rose to 7 by the end of Q3
ransomware-roundup-cover

All this is bad news for organizations that aren’t truly prepared for Ransomware. It’s no longer a game of having backups, but being prepared for both a full-on data breach and a completely inoperable network. And with Ransomware-as-a-Service continuing to see growth, utilizing the same advanced attack methods and techniques as the leading ransomware variants, we’re going to need to buckle in for Q4 and into 2021.

Organizations can prepare for ransomware attacks using Security Awareness Training to educate their users on phishing attacks (the number one initial attack vector for ransomware) including how to identify them as malicious, and what to do should they think they receive one. Stopping phishing attacks before engaging with malicious content in email is the most effective way to reduce your threat surface and likelihood of successful attack.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews