Remove Backups Remove Cyber Risk Remove Telecommunications
article thumbnail

Scattered Spider x RansomHub: A New Partnership

Digital Shadows

This concealed their attack until the environment was encrypted and backups were sabotaged. Scattered Spider previously targeted telecommunications firms, likely to support its SIM-swapping activities that facilitate account takeovers. For the local data backup server, the attacker used the open-source disk encryption tool VeraCrypt.

article thumbnail

The Surge of Double Extortion Ransomware Attacks

Pen Test

Sopra Steria - One of the Largest Reported Ransoms Europe's major IT services firm Sopra Steria was breached in October 2020 by the Ryuk gang, with extensive backups preventing major disruption. Keep backups completely isolated and air-gapped offline to prevent malware from infecting those too. Use immutable object storage for backups.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

It is vital for any enterprise landscape to ensure viable, open, and reliable corporate communications – fostering innovation and economic prosperity, with respect to safeguarding against disruption and serious cyber risk perception. What are the benefits of cyber security awareness trainings?

article thumbnail

Scattered Spider x RansomHub: A New Partnership

Digital Shadows

This concealed their attack until the environment was encrypted and backups were sabotaged. Scattered Spider previously targeted telecommunications firms, likely to support its SIM-swapping activities that facilitate account takeovers. For the local data backup server, the attacker used the open-source disk encryption tool VeraCrypt.

article thumbnail

2023 Cyber Threat Predictions

Digital Shadows

With many companies improving their incident response and ability to restore services through the use of backups, it is possible that the intentional breach of data is actually the more impactful side of a double extortion attack; according to research from 2022, the average cost of a data breach was USD 4.35