Security News > 2021 > May > Ransomware victim shows why transparency in attacks matters
As devastating ransomware attacks continue to have far-reaching consequences, companies still try to hide the attacks rather than be transparent.
Volue's transparency is in stark contrast to the disclosures typically seen in ransomware attacks and should be used as a model for future disclosures.
Many are comparing Volue's transparency to Norsk Hydro's, another Norwegian company who also garnered respect for how they handled a 2019 LockerGoga ransomware attack.
Instead, almost every ransomware victim first tries to hide an attack out of fear that it could cause reputational or legal harm.
Ultimately, the true nature of the attack is revealed after a malware sample or note is found, or the ransomware gangs publish data stolen during the attack.
The FBI has urged victims to report ransomware attacks so they can receive fresh IOCs about a ransomware operation.
News URL
Related news
- UK health services call-handling vendor faces $7.7M fine over 2022 ransomware attack (source)
- McLaren hospitals disruption linked to INC ransomware attack (source)
- Six ransomware gangs behind over 50% of 2024 attacks (source)
- CISA warns of Jenkins RCE bug exploited in ransomware attacks (source)
- CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks (source)
- Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds (source)
- Most ransomware attacks occur between 1 a.m. and 5 a.m. (source)
- New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data (source)
- Lateral movement: Clearest sign of unfolding ransomware attack (source)
- BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave (source)