What are the most common strains of ransomware over the last few years? Which strains are demanding (and receiving) the highest ransoms? How do the most “successful” ransomware groups infiltrate their victims? What techniques do they use to spread around the network? How (and how often) is data exfiltrated in addition to being encrypted? And most importantly—what can organizations do to prevent, contain, and otherwise rein in the most virulent ransomware?
If you want data-driven answers to any of those questions, volume 2 of the Investigative Cybercrime Series, Reining In Ransomware, is for you. By “data-driven,” we mean that this isn’t one of those fluff pieces in which we stand on our cyber expert soapbox and prattle off opinions about how you can live your best ransomware-free life in just five steps. Instead, we’ve deeply analyzed on- the-ground evidence collected while responding to nearly 1,500 ransomware events exceeding $1 billion in ransom demands. Through it all, we’ve helped our clients manage their response, minimize costs, and maintain business operations. And we hope this report helps many other organizations and insurers do the same.
Looking for more?
If you’re interested in other insights gained from analyzing nearly 1,500 ransomware cases, I’d encourage you to check out the full report Reining In Ransomware, the second volume of our Investigative Cybercrime Series, in partnership with Arete. And if you haven’t read volume 1, Mitigating Ransomware’s Impact, give it and its accompanying post on Information Asymmetry a read as well. In them, we cover trends in demands and payment, payment rates, effectiveness of MFA and backups, and more!
Leave a ReplyWant to join the discussion?
Feel free to contribute!