Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    1 in 7 Ransomware Extortion Leaks Include Sensitive Operational Technology Details

    New analysis of published data from ransomware attacks puts the spotlight on the potential that some of your most critical data stolen puts you materially at risk of another attack.

    Anyone feel like publishing their usernames and passwords, IP addresses, remote service details, asset tags, original equipment manufacturer (OEM) information, or network diagrams? No one in their right mind would put any of this information out for public consumption.

    But, according to the security analysts at Mandiant Intelligence, 1 out of every 7 ransomware attacks that include the theft of sensitive data as part of an extortion scheme that gets published includes much of the data I just mentioned. We’ve recently seen a massive jump of 953% (not a typo!) in ransomware attacks that publish victim data, which only helps make this including of sensitive operational technology information more dangerous to victim organizations.

    This is truly concerning.

    The information above can easily be used by hackers intent on infiltrating your network and moving laterally within it. The data types I mentioned above were found by Mandiant when they searched through published data in 2021.

    This news makes it clear that organization cannot afford a ransomware attack and the assumed aftermath of exfiltrated data – something that occurs in 83% of all ransomware attacks. Phishing still remains a primary initial attack vector, putting Security Awareness Training at the top of the list for security initiatives that empower users to play a role in stopping attacks that make it past security solutions all the way to the Inbox.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    RansIm-Monitor3

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 23 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top