Security News > 2020 > May > Huge toll of ransomware attacks revealed in Sophos report

Ransomware might be a dreadful enterprise, but nobody could accuse the criminals behind these attacks of being weak on customer service.
Now you can see why ransomware attacks almost always send back encryption keys when paid - any doubt in the mind of victims would quickly destroy the whole extortion racket as companies knuckled down to do the hard work themselves.
Far from being a counsel of despair, it's clear that organisations can limit the effect of ransomware attacks by assuming an attack is inevitable and planning for it.
Criminal gangs exploit weak RDP credentials to launch targeted ransomware attacks.
It's also worth reading Naked Security's advice on common mistakes that make ransomware easier to pull off from the attacker's point of view.
News URL
Related news
- Casio says data of 8,500 people exposed in October ransomware attack (source)
- Preventing the next ransomware attack with help from AI (source)
- Ransomware on ESXi: The mechanization of virtualized attacks (source)
- OneBlood confirms personal data stolen in July ransomware attack (source)
- Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M (source)
- Medusa ransomware group claims attack on UK's Gateshead Council (source)
- Ransomware attack forces Brit high school to shut doors (source)
- Ransomware gangs pose as IT support in Microsoft Teams phishing attacks (source)
- Google takes action after coder reports 'most sophisticated attack I've ever seen' (source)
- Security pros more confident about fending off ransomware, despite being battered by attacks (source)