Security News > 2020 > May > Huge toll of ransomware attacks revealed in Sophos report
Ransomware might be a dreadful enterprise, but nobody could accuse the criminals behind these attacks of being weak on customer service.
Now you can see why ransomware attacks almost always send back encryption keys when paid - any doubt in the mind of victims would quickly destroy the whole extortion racket as companies knuckled down to do the hard work themselves.
Far from being a counsel of despair, it's clear that organisations can limit the effect of ransomware attacks by assuming an attack is inevitable and planning for it.
Criminal gangs exploit weak RDP credentials to launch targeted ransomware attacks.
It's also worth reading Naked Security's advice on common mistakes that make ransomware easier to pull off from the attacker's point of view.
News URL
Related news
- Halliburton reports $35 million loss after ransomware attack (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Global Cyber Attacks to Double from 2020 to 2024, Report Finds (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Casio confirms customer data stolen in a ransomware attack (source)
- Schools bombarded by nation-state attacks, ransomware gangs, and everyone in between (source)
- BianLian ransomware claims attack on Boston Children's Health Physicians (source)
- Number of Active Ransomware Groups Highest on Record, Cyberint’s Report Finds (source)
- Microsoft: Ransomware Attacks Growing More Dangerous, Complex (source)