U.S. agencies warn of Phobos ransomware attacks on government entities and critical infrastructure since May 2019. The attacks exploit vulnerabilities and use advanced techniques for persistence and elevated privileges. Despite the high ransom costs, paying does not prevent new attacks, with 78% of victims being attacked again.

  • potatopotato@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    8
    ·
    8 months ago

    Crazy opinion incoming: in the current climate ransomware is just pentesting equivalent of the “free” personal injury attorneys. If the pass the pentest, it’s free. If you fail, it’s crazy expensive. Either way it’s relatively benign security auditing that’s causing companies to be slightly less stupid about how they handle IT.

    It’s not the ideal way of doing this, but it’s strangely having a positive impact and mitigating belligerent states abilities to conduct offensive cyber operations if things were to heat up.

    • heeplr@feddit.de
      link
      fedilink
      English
      arrow-up
      1
      ·
      8 months ago

      air gapping doesn’t really help when basically any interface is an attack vector.

      evil maid attacks still work.