Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    October and November Have Been the Two Busiest Months for Ransomware

    Trending data going back to January of 2020 shows that ransomware attacks are continually increasing in number with unusual highs in the 4th quarter.

    Recently, Roger A. Grimes, KnowBe4’s Data-Driven Defense Evangelist wrote an article about how ransomware is about to get much worse. In it, he highlighted how ransomware gangs are moving beyond the “simple” multi-faceted extortion tactics and are becoming “do anything attack gangs.” In essence, with so much experience under their collective belts, ransomware gangs understand there are lots of ways to make money off of a victim organization.

    It may be one of the reasons new data from security vendor BlackFog in their BlackFog Global Ransomware Report shows that the last two months have experienced the highest number of ransomware attacks ever – in a continually-increasing trend that doesn’t seem like it’s going to end.

    To aid Roger’s assertion that attack gangs are looking beyond just encryption of data, according to BlackFog, 89% of ransomware attacks include exfiltration and 86% of them use PowerShell (which, with the proper credentials, gives the threat actors the ability to do just about anything they can think of within your network).

    If you didn’t think ransomware was serious, you had better catch up and realize the trend is only going to continue. BlackFog do cite the same Coveware initial attack data we recently covered that shows phishing as the leading initial attack vector – making Security Awareness Training an effective means to minimize the risk of users falling for those phishing emails designed to launch ransomware attacks that make their way past security solutions.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 23 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top