Industrial Spy: Selling Stolen Data to Competitors
Industrial Spy is a new way of selling stolen data of victims to competitors. Companies can buy their competitors’ trade secrets for millions of dollars – or as little as $2.
Industrial Spy is a new way of selling stolen data of victims to competitors. Companies can buy their competitors’ trade secrets for millions of dollars – or as little as $2.
The True Cost of Ransomware Attacks highlights the downtime costs, reputational damage and the cost of new security implementations when trying to recover from a ransomware attack.
In 2020, 2021 and now 2022, BlackFog measured publicly disclosed attacks globally. We also produced an annual summary of our findings in the 2021 ransomware attack report. In 2022 we will be tracking even more statistics, such as data exfiltration and several others as the year progresses.
Ransomware groups are using increasingly sophisticated technology and infrastructure to carry out attacks while adopting new tactics to pressurize their victims such as recruiting your employees.
The cybercrime landscape is changing, and ransomware group tactics are shifting accordingly On January 14th, 2022, Russian authorities announced they had dismantled REvil, the aggressive ransomware groups that made headlines after successfully attacking Colonial Pipeline. Several of its leading members were arrested in a large-scale operation that took place over [...]
Industrialized cybercrime, critical infrastructure attacks and sky-high ransoms are just the beginning of ransomware as a service business models.
In 2020 and 2021 BlackFog measured publicly disclosed attacks globally. The 2021 ransomware attack report summarizes these findings and highlights the key trends as we enter 2022.
Following on from our State of Ransomware 2020 blog, we’ll be tracking the 2021 publicized ransomware attacks each month to share with you via this blog. This year we expect the number of attacks to increase and newer forms to become more sophisticated and disruptive.
Over the last few years, leaked data from some of the most devastating cyberattacks has found its way onto the Dark Web, a trend that seems to be increasing with the notable rise in double extortion ransomware attacks. Ransomware attack tools are routinely used to carry out these attacks. Every day [...]
With data theft extortion, instead of a single ransom demand, there may be hundreds or thousands. In most cases, cybercriminals are adopting a dual-revenue model where a single, large-scale ransom demand is accompanied by individual ransoms for affected parties.