Hackers Use Number of Legitimate Tools in Ransomware Attacks

Ransomware attacks remain a formidable challenge for organizations worldwide. These attacks not only encrypt critical data, rendering it inaccessible to the rightful owners but increasingly involve the exfiltration of sensitive information.  This dual-threat approach amplifies the potential damage, as attackers not only demand ransom for the decryption key but also threaten to release the stolen data unless additional payment is made.

Source: GBHackers

 


Date:

Categorie(s):