For today's report, we looked at the evolution of ransomware attacks, which have become increasingly unpredictable and sophisticated over the years.
In this case, we focused on two particular strategies: the multiple extortion tactics and theattack without encryption.
- The first involves the perpetrators of threats not only exfiltrating the victim's data (by encrypting it), but resorting to further coercive measures, such as launching DDoS (Distributed Denial of Service) attacks and direct contact with the victim's customers or business partners.
- Unencrypted attacks, on the other hand, consist of the exfiltration of files without encryption. The focus of extortion shifts to the importance of information
contained in the exfiltrated files.
The purpose of the report is to raise awareness of the issue and to warn of the development of these attacks. I threat actors are making their attack strategies more efficient, as they have realised that stealing sensitive data, information or projects increases the pressure on victims and the possibility of ransom.
Organisations must be aware of these threats and take appropriate measures to protect their valuable data and systems with preventive measures.
If you wish to learn more, here is the link to our full report.
In addition, you can subscribe to the specific mailing list Cyber Studios by Tinexta Defence, to receive updates on upcoming research: https://tinextadefence.it/mailing-list-cyber-studios/