Remove talk tracking-desktop-ransomware-payments-end-to-end
article thumbnail

Exposing the inner-workings of the ransomware economy

Elie

This is the second blog post in my series about ransomware economics. is dedicated to the methodology and techniques needed to trace ransomware payments end-to-end. deep-dives into the major ransomware players and analyzes what made them successful. Ransomware is a multi-million dollar business.

article thumbnail

The Phight Against Phishing

Digital Shadows

We’re talking about the email attack variety. It’s still showing up to drop ransomware and Trojans, harvest credentials, and spy on organizations like yours. What is Phish(ing)? No, not the band , unless you’re really into jam bands. Well, for starters, it continues to be a huge problem for organizations everywhere.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to trace ransomware payments end-to-end

Elie

Over the last two years, ransomware has been all over the news. Hardly a week goes by without a report of a large ransomware outbreak or the emergence of a new ransomware family. Despite all this attention, very little is known about how profitable ransomware is and who the criminals are that benefit from it. final post.

article thumbnail

The Hacker Mind Podcast: Tales From A Ransomware Negotiator

ForAllSecure

Say you’re an organization that’s been hit with ransomware. At what point do you need to bring in a ransomware negotiator? Mark Lance, the VP of DFIR and Threat intelligence for GuidePoint Security, provides The Hacker Mind with stories of ransomware cases he’s handled. Should you pay, should you not?

article thumbnail

Unmasking the ransomware kingpins

Elie

This blog post exposes the cybercriminal groups that dominate the ransomware underworld, and analyzes the reasons for their success. This is the third and final blog post of my series on ransomware economics. The first post was dedicated to the methodology and techniques developed to trace ransomware payments from end to end.