Industry research

2019 Spotlight Report on Ransomware

Vectra research in Spotlight Report on Ransomware reveals that cybercriminals’ most effective weapon in carrying out a ransomware attack is the network itself, which is instrumental in enabling the malicious encryption of shared files on network servers.

This resource is not yet available. It will be published soon so stay tuned!

Publication date:

August 7, 2019

DownloadDownload

Ransomware casts a wider net to ensnare the cloud, data center and enterprise

Cybercriminals target organizations that are most likely to pay larger ransoms to regain access to encrypted files. This can be particularly catastrophic for cloud service providers.

The fallout from ransomware attacks against cloud service providers is far more devastating when the business systems of every cloud-hosted customer are encrypted. It’s an efficient, premeditated criminal threat with a rapid close and no middleman.

The Spotlight Report on Ransomware also reveals:

  • Attackers easily evade network perimeter security and perform internal reconnaissance to locate and encrypt shared network files.
  • Encrypting files that are widely available on the network is faster and more efficient than encrypting files on every single host device.
  • Cybercriminals target organizations that are most likely to pay larger ransoms to regain access to encrypted files.
  • Recognizing ransomware behaviors early in the attack can prevent propagation and the malicious encryption of files.

The Spotlight Report on Ransomware is based on observations and data in the 2019 Black Hat Edition of the Attacker Behavior Industry Report from Vectra.

Yes, yes, we know, filling out forms is painful. But staring at empty boxes is even more painful. Keep in mind the form may not load if you are using an ad blocker. Once the form is filled out, you will receive your resource via email.

Vectra needs the information you provide to us to process your inquiry and to contact you about our products. You may unsubscribe from these communications at anytime. For more information check out our Privacy Policy.