A company that fell victim to a ransomware attack and paid cyber criminals millions for the decryption key to restore their network fell victim to the exact same ransomware gang under two weeks later after failing to examine why the attack was able to happen in the first place.
The cautionary tale is detailed by the UK’s National Cyber Security Centre (NCSC) in a blog post about the rise of ransomware.
The unnamed company fell victim to a ransomware attack and paid millions in bitcoin in order to restore the network and retrieve the files.
However, the company just left it at that, failing to analyse how cyber criminals infiltrated the network – something that came back to haunt them when the same ransomware gang infected the network with the same ransomware less than two weeks later. The company ended up paying a ransom a second time.
“We’ve heard of one organisation that paid a ransom (a little under £6.5million with today’s exchange rates) and recovered their files (using the supplied decryptor), without any effort to identify the root cause and secure their network. Less than two weeks later, the same attacker attacked the victim’s network again, using the same mechanism as before, and re-deployed their ransomware. The victim felt they had no other option but to pay the ransom again,” the NCSC blog said.
The NCSC has detailed the incident as a lesson for other organisations – and the lesson is that if you fall victim to a ransomware attack, find out how it was possible for cyber criminals to embed themselves on the network undetected before the ransomware payload was unleashed.
Read complete zdnet.com articel at source
By Danny Palmer | April 5, 2021 — 12:05 GMT (05:05 PDT) | Topic: Security
Back to news overview
Recent Posts
- Ransomware: The internet’s biggest security crisis is getting worse. We need a way out
- Criminals spread malware using website contact forms with Google URLs
- AI-powered virtual assistants and the future of work
- Facial recognition tech is supporting mass surveillance. It’s time for a ban, say privacy campaigners
- Ransomware: A company paid millions to get their data back, but forgot to do one thing. So the hackers came back again
- How to Check if Your Phone Number Is in the Huge Facebook Data Leak
- Google Chrome Knows Too Much About You: Here’s What To Do
- Facebook vs. Google: Similar models, diverging perspectives
- H&M Purged From Chinese Maps and Online Stores for Criticizing Forced Labor in Xinjiang
- This company was hit by ransomware. Here’s what they did next, and why they didn’t pay up
- Facebook Finally Explains Its Mysterious Wrist Wearable
- Hackers target developers to break into Apple’s garden
- FBI: Over $4.2 billion officially lost to cybercrime in 2020
- Meet the shadowy tech brokers that deliver your data to the NSA
- Mother charged with deepfake plot against daughter’s cheerleading rivals
- When Zombie Data Costs You a Home
- Britain has passed the ‘most extreme surveillance law ever passed in a democracy’
- Global Privacy Control Endorsed by California AG – Next Steps
- How to Tell Which Emails Quietly Track You
- Google Has Been Allowing Advertisers to Exclude Nonbinary People from Seeing Job Ads
- Amazon Alexa skills pose potential security threat according to study
- EFF urges Google to ground its FLoC: ‘Pro-privacy’ third-party cookie replacement not actually great for privacy
- Deepfake videos of Tom Cruise show the technology’s threat to society is very real
- The Truthtellers: China created a story of the pandemic. These people revealed details Beijing left out
- Browser ‘Favicons’ Can Be Used as Undeletable ‘Supercookies’ to Track You Online