Over 700 Ransomware Victim Organizations are Named on Data Leak Sites in Q2

700 Ransomware Victim OrganizationsThis massive increase in the number of victim organizations being named demonstrates the harsh reality of how far ransomware threat actors will actually go if ransoms aren’t paid.

No organizations wants to be a victim of ransomware. And, if an attack does happen, even less organizations want the news to get out. But with ransomware threat actors using double extortion tactics – by encrypting data and threatening to release stolen data – and even engaging in triple extortion, the upper hand seems to be going to the cybercriminals.

New data from cybersecurity vendor Digital Shadows indicates a 47% growth in the number of victim organizations being outed on data leak sites in the second quarter of this year, when compared with Q1.

The largest industry impacted is Industrial Goods & Services, with the United States the prominent leader by a factor of at least 7 over the next country in the list.

Digital Shadows thinks with the success of the newsworthy attacks we’ve all seen in the last few months on well-known companies in the Industrial, Manufacturing, and Tech sectors, these selective attacks will continue, hitting companies that simply cannot afford to either be down or have their good name tarnished with a successful ransomware attack.

With organizations being considered “big game” for ransomware threat actors that have access to world-class Ransomware-as-a-Service and Initial Access Brokers (who sell compromised accounts and access to company networks), it’s only going to be easier and easier for more “wanna be” threat actors to get into the game with a material degree of efficacy.

Having a defense in place that includes Security Awareness Training to stop phishing-based initial attacks is critical now more than ever. By educating users continually, any email or web-based malicious content can be easily identified and avoided, before the threat actor gets control.

Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:


Topics: Ransomware

Subscribe to Our Blog

Comprehensive Anti-Phishing Guide

Get the latest about social engineering

Subscribe to CyberheistNews