Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1552,"date":"2023-11-01T12:51:47","date_gmt":"2023-11-01T12:51:47","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/"},"modified":"2023-11-01T12:51:47","modified_gmt":"2023-11-01T12:51:47","slug":"extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/","title":{"rendered":"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm"},"content":{"rendered":"

Ransomware on the rise<\/span> <\/strong><\/h2>\n

We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, r\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Ransomware on the rise <\/strong><\/h2>\n

We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, ransomware \u201c\u2026continues its reign as one of the top Action types present in breaches, and while it did not actually grow, it did hold statistically steady at 24%.\u201d<\/p>\n

And the fundamental reason for its longevity of course is financial. As the DBIR pointed out in nearly all breach types, \u201c\u2026the primary motivation for attacks continues to be overwhelmingly financially driven, at 95% of breaches.\u201d<\/p>\n

But that\u2019s not the whole story<\/strong><\/h2>\n

Ransomware is taking on new forms. \u00a0Up until the past year or so, bad actors would typically take steps to infiltrate businesses, then find a way to access as much critical data as they could and encrypt it, then essentially hold this data until the ransom is paid. Ransomware attacks are certainly a frustrating process for businesses, and a rather involved one for bad actors. For attackers, the basic ransom process involves a somewhat diminished payoff, as this multi-player scheme involves profit sharing from other bad actors in the attack chain structure.<\/p>\n

Encryption to some bad actors is passe\u2019<\/strong><\/h2>\n

When it comes to digital crime these days, never underestimate the greed factor and the ongoing search for a path of least resistance. A trend that has been building recently centers on the thought \u2013 \u201cWhy bother with encryption at all, why not just analyze the data, find what is valuable, and threaten to expose the most crucial and reputation-damaging information?\u201d<\/p>\n

For bad actors, this eliminates one of the steps in the attack-chain, but also reduces the need to share the profits with the encryption players (e.g., commoditized source code libraries). \u00a0This type of attack is often referred to as \u201cextortionware\u201d or \u201ccyber extortion,\u201d among other terms.<\/p>\n

And what about that Data?<\/strong><\/h2>\n

For bad actors who take the time and effort to analyze the data, there can be additional financial rewards. This new focus is centered on identifying partners and clients of the targeted business and utilizing this group as leverage to convince the targeted business to pay the extortion money \u2013 to avoid the inevitable exposure and consequences of the breach.<\/p>\n

How far has this extortionware gone?<\/strong><\/h2>\n

We\u2019ve seen in the past that if there are enough repeat types of tactics and techniques frequently occurring, some in the security industry will categorize them, the same situation here. You will likely find variations of methods used in ransomware extortion \u2013 but the following is a very quick summary of at least four known techniques that bad actors have been using, not necessarily in this order:<\/p>\n

Single extortion attack \u2013 typical encryption techniques
\nDouble extortion attack \u2013 exfiltrate data first, then encrypt, threaten to expose data
\nTriple extortion attack \u2013 as in the above but leveraging the victim\u2019s customers and partners
\nQuadruple extortion attack \u2013 adding insult to injury above, threatening to attack the victim\u2019s web servers with a DDoS attack.<\/p>\n

What is a business to do?<\/strong><\/h2>\n

The good news is that most businesses are doing most of what\u2019s required to successfully defend themselves against these types of attacks. But as everyone is aware, these attacks keep occurring, and will continue as long as a financial profit is realizable.<\/p>\n

Fundamentally the most successful businesses employ, but are not limited to, three key areas of defense:<\/p>\n

SOC Expertise<\/strong> \u2013 human expertise, either in-house or managed, has the final say.
\nAdvanced Security Tools<\/strong> \u2013 utilizing XDR, AI, Automation, and other key capabilities to reduce detection and remediation times and to minimize human error, as well as triage, investigations, and incident response.
\nBest Practices<\/strong> \u2013 to answer simple questions such as (1) does your security staff have specific roles when a breach occurs, (2) besides having a plan, has it been tested? and (3) is IT, SecOps, and other stakeholders bought into the plan?<\/p>\n

Example of an Advanced Security Tools<\/strong><\/h2>\n

Recently Cisco announced Cisco XDR<\/a>, a product that helps to simplify your security operations and to remediate the highest priority incidents with greater speed, efficiency, and confidence.<\/p>\n

The name of the game is to be security resilient and to minimize the possibility of attacks such as extortionware. Please check out the Cisco XDR info and demos here<\/a>.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Ransomware is evolving. Bad actors are using various methods to increase profits by analyzing and leveraging the victims data and not bothering to encrypt.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Ransomware on the rise<\/span> <\/strong><\/h2>\n

We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, r\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

Ransomware on the rise <\/strong><\/h2>\n

We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, ransomware \u201c\u2026continues its reign as one of the top Action types present in breaches, and while it did not actually grow, it did hold statistically steady at 24%.\u201d<\/p>\n

And the fundamental reason for its longevity of course is financial. As the DBIR pointed out in nearly all breach types, \u201c\u2026the primary motivation for attacks continues to be overwhelmingly financially driven, at 95% of breaches.\u201d<\/p>\n

But that\u2019s not the whole story<\/strong><\/h2>\n

Ransomware is taking on new forms. \u00a0Up until the past year or so, bad actors would typically take steps to infiltrate businesses, then find a way to access as much critical data as they could and encrypt it, then essentially hold this data until the ransom is paid. Ransomware attacks are certainly a frustrating process for businesses, and a rather involved one for bad actors. For attackers, the basic ransom process involves a somewhat diminished payoff, as this multi-player scheme involves profit sharing from other bad actors in the attack chain structure.<\/p>\n

Encryption to some bad actors is passe\u2019<\/strong><\/h2>\n

When it comes to digital crime these days, never underestimate the greed factor and the ongoing search for a path of least resistance. A trend that has been building recently centers on the thought \u2013 \u201cWhy bother with encryption at all, why not just analyze the data, find what is valuable, and threaten to expose the most crucial and reputation-damaging information?\u201d<\/p>\n

For bad actors, this eliminates one of the steps in the attack-chain, but also reduces the need to share the profits with the encryption players (e.g., commoditized source code libraries). \u00a0This type of attack is often referred to as \u201cextortionware\u201d or \u201ccyber extortion,\u201d among other terms.<\/p>\n

And what about that Data?<\/strong><\/h2>\n

For bad actors who take the time and effort to analyze the data, there can be additional financial rewards. This new focus is centered on identifying partners and clients of the targeted business and utilizing this group as leverage to convince the targeted business to pay the extortion money \u2013 to avoid the inevitable exposure and consequences of the breach.<\/p>\n

How far has this extortionware gone?<\/strong><\/h2>\n

We\u2019ve seen in the past that if there are enough repeat types of tactics and techniques frequently occurring, some in the security industry will categorize them, the same situation here. You will likely find variations of methods used in ransomware extortion \u2013 but the following is a very quick summary of at least four known techniques that bad actors have been using, not necessarily in this order:<\/p>\n

Single extortion attack \u2013 typical encryption techniques
\nDouble extortion attack \u2013 exfiltrate data first, then encrypt, threaten to expose data
\nTriple extortion attack \u2013 as in the above but leveraging the victim\u2019s customers and partners
\nQuadruple extortion attack \u2013 adding insult to injury above, threatening to attack the victim\u2019s web servers with a DDoS attack.<\/p>\n

What is a business to do?<\/strong><\/h2>\n

The good news is that most businesses are doing most of what\u2019s required to successfully defend themselves against these types of attacks. But as everyone is aware, these attacks keep occurring, and will continue as long as a financial profit is realizable.<\/p>\n

Fundamentally the most successful businesses employ, but are not limited to, three key areas of defense:<\/p>\n

SOC Expertise<\/strong> \u2013 human expertise, either in-house or managed, has the final say.
\nAdvanced Security Tools<\/strong> \u2013 utilizing XDR, AI, Automation, and other key capabilities to reduce detection and remediation times and to minimize human error, as well as triage, investigations, and incident response.
\nBest Practices<\/strong> \u2013 to answer simple questions such as (1) does your security staff have specific roles when a breach occurs, (2) besides having a plan, has it been tested? and (3) is IT, SecOps, and other stakeholders bought into the plan?<\/p>\n

Example of an Advanced Security Tools<\/strong><\/h2>\n

Recently Cisco announced Cisco XDR<\/a>, a product that helps to simplify your security operations and to remediate the highest priority incidents with greater speed, efficiency, and confidence.<\/p>\n

The name of the game is to be security resilient and to minimize the possibility of attacks such as extortionware. Please check out the Cisco XDR info and demos here<\/a>.<\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Ransomware is evolving. Bad actors are using various methods to increase profits by analyzing and leveraging the victims data and not bothering to encrypt.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1553,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nExtortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm\" \/>\n<meta property=\"og:description\" content=\"Ransomware on the rise We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, r\u2026 Read more on Cisco Blogs \u200b Ransomware on the rise We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, ransomware \u201c\u2026continues its reign as one of the top Action types present in breaches, and while it did not actually grow, it did hold statistically steady at 24%.\u201d And the fundamental reason for its longevity of course is financial. As the DBIR pointed out in nearly all breach types, \u201c\u2026the primary motivation for attacks continues to be overwhelmingly financially driven, at 95% of breaches.\u201d But that\u2019s not the whole story Ransomware is taking on new forms. \u00a0Up until the past year or so, bad actors would typically take steps to infiltrate businesses, then find a way to access as much critical data as they could and encrypt it, then essentially hold this data until the ransom is paid. Ransomware attacks are certainly a frustrating process for businesses, and a rather involved one for bad actors. For attackers, the basic ransom process involves a somewhat diminished payoff, as this multi-player scheme involves profit sharing from other bad actors in the attack chain structure. Encryption to some bad actors is passe\u2019 When it comes to digital crime these days, never underestimate the greed factor and the ongoing search for a path of least resistance. A trend that has been building recently centers on the thought \u2013 \u201cWhy bother with encryption at all, why not just analyze the data, find what is valuable, and threaten to expose the most crucial and reputation-damaging information?\u201d For bad actors, this eliminates one of the steps in the attack-chain, but also reduces the need to share the profits with the encryption players (e.g., commoditized source code libraries). \u00a0This type of attack is often referred to as \u201cextortionware\u201d or \u201ccyber extortion,\u201d among other terms. And what about that Data? For bad actors who take the time and effort to analyze the data, there can be additional financial rewards. This new focus is centered on identifying partners and clients of the targeted business and utilizing this group as leverage to convince the targeted business to pay the extortion money \u2013 to avoid the inevitable exposure and consequences of the breach. How far has this extortionware gone? We\u2019ve seen in the past that if there are enough repeat types of tactics and techniques frequently occurring, some in the security industry will categorize them, the same situation here. You will likely find variations of methods used in ransomware extortion \u2013 but the following is a very quick summary of at least four known techniques that bad actors have been using, not necessarily in this order: Single extortion attack \u2013 typical encryption techniques Double extortion attack \u2013 exfiltrate data first, then encrypt, threaten to expose data Triple extortion attack \u2013 as in the above but leveraging the victim\u2019s customers and partners Quadruple extortion attack \u2013 adding insult to injury above, threatening to attack the victim\u2019s web servers with a DDoS attack. What is a business to do? The good news is that most businesses are doing most of what\u2019s required to successfully defend themselves against these types of attacks. But as everyone is aware, these attacks keep occurring, and will continue as long as a financial profit is realizable. Fundamentally the most successful businesses employ, but are not limited to, three key areas of defense: SOC Expertise \u2013 human expertise, either in-house or managed, has the final say. Advanced Security Tools \u2013 utilizing XDR, AI, Automation, and other key capabilities to reduce detection and remediation times and to minimize human error, as well as triage, investigations, and incident response. Best Practices \u2013 to answer simple questions such as (1) does your security staff have specific roles when a breach occurs, (2) besides having a plan, has it been tested? and (3) is IT, SecOps, and other stakeholders bought into the plan? Example of an Advanced Security Tools Recently Cisco announced Cisco XDR, a product that helps to simplify your security operations and to remediate the highest priority incidents with greater speed, efficiency, and confidence. The name of the game is to be security resilient and to minimize the possibility of attacks such as extortionware. Please check out the Cisco XDR info and demos here. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Ransomware is evolving. Bad actors are using various methods to increase profits by analyzing and leveraging the victims data and not bothering to encrypt.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-01T12:51:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm\",\"datePublished\":\"2023-11-01T12:51:47+00:00\",\"dateModified\":\"2023-11-01T12:51:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\"},\"wordCount\":828,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\",\"name\":\"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif\",\"datePublished\":\"2023-11-01T12:51:47+00:00\",\"dateModified\":\"2023-11-01T12:51:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/","og_locale":"en_US","og_type":"article","og_title":"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm","og_description":"Ransomware on the rise We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, r\u2026 Read more on Cisco Blogs \u200b Ransomware on the rise We\u2019d all like ransomware to be defeated so we can go about our business. That day is not coming in the near future. Instead, and according to the 2023 Verizon DBIR report, ransomware \u201c\u2026continues its reign as one of the top Action types present in breaches, and while it did not actually grow, it did hold statistically steady at 24%.\u201d And the fundamental reason for its longevity of course is financial. As the DBIR pointed out in nearly all breach types, \u201c\u2026the primary motivation for attacks continues to be overwhelmingly financially driven, at 95% of breaches.\u201d But that\u2019s not the whole story Ransomware is taking on new forms. \u00a0Up until the past year or so, bad actors would typically take steps to infiltrate businesses, then find a way to access as much critical data as they could and encrypt it, then essentially hold this data until the ransom is paid. Ransomware attacks are certainly a frustrating process for businesses, and a rather involved one for bad actors. For attackers, the basic ransom process involves a somewhat diminished payoff, as this multi-player scheme involves profit sharing from other bad actors in the attack chain structure. Encryption to some bad actors is passe\u2019 When it comes to digital crime these days, never underestimate the greed factor and the ongoing search for a path of least resistance. A trend that has been building recently centers on the thought \u2013 \u201cWhy bother with encryption at all, why not just analyze the data, find what is valuable, and threaten to expose the most crucial and reputation-damaging information?\u201d For bad actors, this eliminates one of the steps in the attack-chain, but also reduces the need to share the profits with the encryption players (e.g., commoditized source code libraries). \u00a0This type of attack is often referred to as \u201cextortionware\u201d or \u201ccyber extortion,\u201d among other terms. And what about that Data? For bad actors who take the time and effort to analyze the data, there can be additional financial rewards. This new focus is centered on identifying partners and clients of the targeted business and utilizing this group as leverage to convince the targeted business to pay the extortion money \u2013 to avoid the inevitable exposure and consequences of the breach. How far has this extortionware gone? We\u2019ve seen in the past that if there are enough repeat types of tactics and techniques frequently occurring, some in the security industry will categorize them, the same situation here. You will likely find variations of methods used in ransomware extortion \u2013 but the following is a very quick summary of at least four known techniques that bad actors have been using, not necessarily in this order: Single extortion attack \u2013 typical encryption techniques Double extortion attack \u2013 exfiltrate data first, then encrypt, threaten to expose data Triple extortion attack \u2013 as in the above but leveraging the victim\u2019s customers and partners Quadruple extortion attack \u2013 adding insult to injury above, threatening to attack the victim\u2019s web servers with a DDoS attack. What is a business to do? The good news is that most businesses are doing most of what\u2019s required to successfully defend themselves against these types of attacks. But as everyone is aware, these attacks keep occurring, and will continue as long as a financial profit is realizable. Fundamentally the most successful businesses employ, but are not limited to, three key areas of defense: SOC Expertise \u2013 human expertise, either in-house or managed, has the final say. Advanced Security Tools \u2013 utilizing XDR, AI, Automation, and other key capabilities to reduce detection and remediation times and to minimize human error, as well as triage, investigations, and incident response. Best Practices \u2013 to answer simple questions such as (1) does your security staff have specific roles when a breach occurs, (2) besides having a plan, has it been tested? and (3) is IT, SecOps, and other stakeholders bought into the plan? Example of an Advanced Security Tools Recently Cisco announced Cisco XDR, a product that helps to simplify your security operations and to remediate the highest priority incidents with greater speed, efficiency, and confidence. The name of the game is to be security resilient and to minimize the possibility of attacks such as extortionware. Please check out the Cisco XDR info and demos here. We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Ransomware is evolving. Bad actors are using various methods to increase profits by analyzing and leveraging the victims data and not bothering to encrypt.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/","og_site_name":"JHC","article_published_time":"2023-11-01T12:51:47+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/"},"author":{"name":"","@id":""},"headline":"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm","datePublished":"2023-11-01T12:51:47+00:00","dateModified":"2023-11-01T12:51:47+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/"},"wordCount":828,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/","url":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/","name":"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif","datePublished":"2023-11-01T12:51:47+00:00","dateModified":"2023-11-01T12:51:47+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16419943-t1apqL.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/extortionware-how-bad-actors-are-taking-the-shortest-path-to-your-money-pat-correia-on-november-1-2023-at-1200-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Extortionware \u2013 how bad actors are taking the shortest path to your money Pat Correia on November 1, 2023 at 12:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1552"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1552\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1553"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}