Global Ransomware Report
Threat actors who attack using ransomware have evolved over the past five years, from encryption techniques to software. They have undergone many operational changes, such as their programming languages. However, the focus of the change we have experienced lately is how the post-attack causes more damage to the target institution rather than how the actors carry out their attacks.
As the attackers are no longer content with just encrypting files in the systems they target, there are more and more instances where attackers threaten to share their data with the public to harm the reputation of the target organization.
This report aims to provide comprehensive information on ransomware, one of the most common weapons used by cybercriminals.
Type: Report
Year: 2022
Show Report
Global Ransomware Report
Threat actors who attack using ransomware have evolved over the past five years, from encryption techniques to software. They have undergone many operational changes, such as their programming languages. However, the focus of the change we have experienced lately is how the post-attack causes more damage to the target institution rather than how the actors carry out their attacks.
As the attackers are no longer content with just encrypting files in the systems they target, there are more and more instances where attackers threaten to share their data with the public to harm the reputation of the target organization.
This report aims to provide comprehensive information on ransomware, one of the most common weapons used by cybercriminals.
Type: Report
Year: 2022
Show Report