Hi! I wrote a post describing the main stages of a ransomware attack, from exploiting a user's endpoint (client-side attack) to the three possible extortion demands: ransom for decryption keys, ransom for recovering exfiltrated data, and ransom to avoid DDoS attacks. I also present a complete list of countermeasures based on the NIST Ransomware Framework Profile, derived from the NIST Cybersecurity Framework. I hope this can be helpful!
Page 1 / 1
I’m not a security guy, so it was very informative to me.
Wonderful post, Luiz!
Comment
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.