Nemty Ransomware Creators Plan to Post Stolen Data of Non-Payors to Blog

ransomware-screen-skull-1In a twist to the newest ransomware tactic where data is stolen and then encrypted, the folks behind Nemty are going to use a blog to publish victims data if they don’t pay.

As organizations get better at recovering from a ransomware attack, the attack itself is less impactful. So, ransomware creators have figured out how to step up their game – extortion. Since they have gained access to your data – usually just to hold it for ransom – why not first exfiltrate some or all of it, and use that additional factor as motivation to get victim organizations to pay the ransom?

While a new tactic, the idea of publicizing sensitive data isn’t new. Netmy’s idea of hosting a blog somehow seems a bit simple, yet novel. The use of a blog would add credibility to their claim of being willing to post the data (prospective victims can simply navigate to it to see previous victim’s data).

So, as if the disruption of a ransomware attack wasn’t enough, now the threat includes you needing to worry about the impact a release of your sensitive data would have.

It seems that cybercriminals will never accept defeat, and will continue to look for ways to ensure you will be willing to part with your money.

Putting security controls in place to monitor email and web content for malicious links and attachments is a necessary first step. But, as these crafty coders continue to find ways to ensure delivery of ransomware to a user’s desktop, it’s imperative that Security Awareness Training be a central part of your security strategy. Users that undergo this training are more likely to be suspicious of unsolicited content they interact with and less likely to click on malicious content in emails and on the web.

Free Ransomware Simulator Tool

Bad guys are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 18 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RanSimScreen-1Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 19 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Subscribe To Our Blog

Your Coronavirus and Work From Home Resource Center

Get the latest about social engineering

Subscribe to CyberheistNews