![]() ![]() Kaseya hack floods hundreds of companies with ransomware Read more on TechCrunchĪre we overestimating the ransomware threat?įujifilm becomes the latest victim of a network-crippling ransomware attack The group has racked up more than $11 million in ransom payments this year, according to Ransomwhere, an amount that could increase dramatically if its recent demands for $70 million as part of the Kaseya attack are met. The bulk of these payments have been made to the REvil, the Russia-linked ransomware gang that took credit for the JBS and Kaseya hacks. “For law enforcement, as we saw with the Colonial Pipeline hack, law enforcement does have the ability to recover some payments, so it would be great if this can further aid their efforts.”Īt the time of writing, the site is tracking a total of more than $32 million in ransom payments for 2021. “As we consider policy proposals to change the state of ransomware economics, we will need data to assess whether these actions are successful," Cable said. The already-burgeoning database, which doesn’t include any personal or victim-identifying information, is available as a free download for the cybersecurity community and law enforcement officials, which Cable hopes will help give some much-needed public transparency about the current state of the problem. Cybersecurity and Infrastructure Agency (CISA), is looking to solve that problem with the launch of a crowdsourced ransom payments tracking website, Ransomwhere. Jack Cable, a security architect at Krebs Stamos Group who previously worked for the U.S. However, while ransomware attacks continue to make headlines, it’s nearly impossible to understand their full impact, nor is it known whether taking certain decisions - such as paying the cybercriminals’ ransom demands - make a difference. In the last few months alone we’ve witnessed the attack on Colonial Pipeline that forced the company to shut down its systems - and the gasoline supply - to much of the eastern seaboard, the hack on meat supplier JBS that abruptly halted its slaughterhouse operations around the world, and just this month a supply chain attack on IT vendor Kaseya that saw hundreds of downstream victims locked out of their systems. ![]() These file-encrypting attacks have continued largely unabated this year, too. Olaf College.Ransomware attacks, fueled by COVID-19 pandemic turbulence, have become a major money earner for cybercriminals, with the number of attacks rising in 2020. She has a MS in Security Technologies from the University of Minnesota and a BA in Anthropology, Sociology, and Middle Eastern Studies from St. Davison has volunteered throughout her career, lending her expertise to survivors of domestic abuse and election protection efforts. Before working in Silicon Valley, she conducted extensive research on the efficacy of security engagement and co-led a consulting firm that built behavioral based programs for 15+ Fortune 500 companies. Davison has held leadership roles at Lyft, Snap Inc., and Uber where she led efforts across security, privacy, and trust & safety with a particular emphasis on behavioral engsineering, offensive security, and content moderation. Prior to KSG, Davison served as the Director of Trust & Privacy Engineering at Robinhood, building and leading all consumer facing security, privacy, and trust & safety engineering in addition to offensive security and intelligence functions. Samantha Davison is a Director at the Krebs Stamos Group where she works with clients to build industry leading Trust & Safety and Privacy programs and strategies. Dakota is also a Nonresident Fellow at the Atlantic Council's Global China Hub. He holds a MA in Security Studies and Asian Affairs certificate from Georgetown University and a BA in Political Science from UNC Wilmington. Dakota has also testified before the US-China Economic and Security Review Commission and briefed defense agencies on his research. He has been featured and quoted on his expertise in a variety of outlets, including The Economist, MIT Technology Review, The Hill, Breaking Defense, and Defense One. His work examined artificial-intelligence and cybersecurity research at Chinese universities, the People’s Liberation Army’s efforts to automate software vulnerability discovery, and new policies to improve China’s cybersecurity talent pipeline. Dakota previously worked at Georgetown University’s Center for Security and Emerging Technology on the CyberAI Project. Dakota provides insights to clients on China's hacking teams, their capabilities and research, and the industrial policies that drive their behavior.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |