Today, ransomware attackers won’t simply back down if their demands are not met. Even companies who have great backups and a fast recovery process are vulnerable to an emerging strategy: exfiltrating the victim’s most private data before demanding a ransom. If victims refuse to make the payment and initiate restoring their systems, the attacker reveals what information they have exfiltrated and threatens to post it online.
That threat is completely different from the standard ransomware threat. This is because we’ve now shifted from an Integrity and Availability threat to a Confidentiality threat and of course there is the possible nightmare of privacy and other compliance regulations depending on the nature of the data that’s been exfiltrated.
During this webcast, Randy Franklin Smith from Ultimate Windows Security provides an overview of some recent high-profile attacks that have employed this strategy, including those against Honda, Xerox and Garmin. He will also discuss detection methods and MITRE ATT&CK® techniques commonly used in ransomware attacks.
Then, Brian Coulson from LogRhythm’s Threat Research team will demonstrate how to detect and respond to these types of threats using MITRE ATT&CK, UEBA capabilities, and more.
Join this webinar to learn about the latest trends in ransomware and how you can protect your organisation from them.