Mapping the Evolution of Cyber Extortion
Threats have been improving their ransomware attacks for years now. Traditional forms of ransomware attacks used encryption of stolen data. After successful encryption, attackers demanded ransom in exchange for a decryption key. This technique started to fail as businesses could retrieve data from backups.
To counter this, attackers made malware that compromised backups. Victims started paying, but FBI recommendations suggested they not pay.
The attackers soon realized they would need something foolproof to blackmail victims. They made ransomware that stole data without encryption. Even if victims had backups, attackers could still extort using stolen data, threatening to leak confidential data if the ransom wasn’t paid.
Making matte
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.