Security News > 2020 > May > Huge toll of ransomware attacks revealed in Sophos report
Ransomware might be a dreadful enterprise, but nobody could accuse the criminals behind these attacks of being weak on customer service.
Now you can see why ransomware attacks almost always send back encryption keys when paid - any doubt in the mind of victims would quickly destroy the whole extortion racket as companies knuckled down to do the hard work themselves.
Far from being a counsel of despair, it's clear that organisations can limit the effect of ransomware attacks by assuming an attack is inevitable and planning for it.
Criminal gangs exploit weak RDP credentials to launch targeted ransomware attacks.
It's also worth reading Naked Security's advice on common mistakes that make ransomware easier to pull off from the attacker's point of view.
News URL
Related news
- Halliburton reports $35 million loss after ransomware attack (source)
- City of Columbus: Data of 500,000 stolen in July ransomware attack (source)
- Columbus, Ohio, confirms 500K people affected by Rhysida ransomware attack (source)
- Critical Veeam RCE bug now used in Frag ransomware attacks (source)
- New Ymir ransomware partners with RustyStealer in attacks (source)
- New Ymir Ransomware Exploits Memory for Stealthy Attacks; Targets Corporate Networks (source)
- New 'Helldown' Ransomware Variant Expands Attacks to VMware and Linux Systems (source)
- Five backup lessons learned from the UnitedHealth ransomware attack (source)
- Mega US healthcare payments network restores system 9 months after ransomware attack (source)
- SafePay ransomware gang claims Microlise attack that disrupted prison van tracking (source)