Ransomware attacks have a nasty double strategy
It’s bad enough when a business is attacked and has to pay a “ransom” for its encrypted files. Now criminals are also looking through them for compromising information.6 Apr 2020 David Schahinian
Malware like Sodinokibi is not new: its creators gain access to company computers and networks, encrypt important files and demand a ransom for their release. Recently, media reports have been increasing, on bleepingcomputer.com for example, according to which the attackers are using a second strategy: they search the data set for information that could be particularly damaging to the company under attack – such as the social security numbers of its customers. If they find such information, then they threaten to publish it or sell it on the dark web. They also say that they will tell the affected customers about it, including the name of the company they have to “thank” for the leak. A company’s reputation would be severely affected by such “public shaming”, and the effects could be much more serious than the financial losses.
The case of the automotive supplier Gedia highlighted the consequences of such an attack in January, in which sensitive data was published. Its entire IT infrastructure was also paralyzed. The technical portal heise.de predicts that this trend will continue and grow. This means that companies should consider ransomware infections as potential sensitive data leaks – and when in doubt, inform their customers early, before the attackers do.
Interested in news about exhibitors, top offers and trends in the industry?
Your web browser is outdated. Update your browser for more security, speed and optimal presentation of this page.Update Browser