Attackers are really just getting more organized. You know, we’re even seeing things like ransomware groups hiring negotiators to help negotiate the ransoms to get better payouts. We’re seeing them do things like hire industry subject matter experts who know a given organization’s business and how they operate and helping them come up with a very reasonable ransom. What I mean by that, is a ransom high enough that you’ll still pay it, but not so high, that it doesn’t seem to make sense for you from a cost benefit analysis. So they’re trying to get really good at coming up with numbers for what they request in the ransom. We’re seeing things like ransomware as a service. These attackers are selling parts of an attack. So, if you already have access to an organization, you can go out and buy the ransomware or malware and leverage that. We’re also seeing impacts targeting managed service providers. So, for instance, the Kaseya attack that happened last year, that was a managed service provider and it was estimated that that affected some 1500 organizations.
So again, it’s a bang for your buck type of scenario for the attacker. How do I take the least amount of effort and risk and have the biggest amount of impact and chance of getting paid for the efforts.
This concludes Part 1of the first episode of the NextLabs Cybersecurity Expert Series, Data Security and Ransomware Defense. In Part 2, Bill Fisher will cover mitigating ransomware risk and what resources NIST offers to help manage this risk. Stay tuned to learn more.

To comment on this post
Login to NextLabs Community
NextLabs seeks to provide helpful resources and easy to digest information on data-centric security related topics. To discuss and share insights on this resource with peers in the data security field, join the NextLabs community.
Don't have a NextLabs ID? Create an account.