Double extortion: Difference between revisions
From ACT Wiki
Jump to navigationJump to search
imported>Doug Williamson (Create page - source - The Treasurer - In case you missed it - 9 December 2021) |
(Add link.) |
||
Line 14: | Line 14: | ||
*[[Cyber security]] | *[[Cyber security]] | ||
*[[Cyberthreat]] | *[[Cyberthreat]] | ||
*[[Dark web]] | |||
*[[Initial access broker]] | *[[Initial access broker]] | ||
*[[Malware]] | *[[Malware]] | ||
Line 21: | Line 22: | ||
*[[Whaling]] | *[[Whaling]] | ||
[[Category:Identify_and_assess_risks]] | [[Category:Identify_and_assess_risks]] | ||
[[Category:Manage_risks]] | [[Category:Manage_risks]] | ||
[[Category:Risk_reporting]] | |||
[[Category:Risk_frameworks]] | [[Category:Risk_frameworks]] | ||
[[Category: | [[Category:The_business_context]] | ||
Latest revision as of 01:53, 5 February 2024
Cyberthreat - ransomware.
Double extortion is a form of ransomware attack in which the attacker not only corrupts the victim's data, but also threatens to leak its sensitive information online.
- Why double extortion is surging
- "... the dramatic surge in this practice stems from an 'unholy alliance' between ransomware makers and initial access brokers – the latter of whom are operating on the dark web and presenting themselves as malicious twins of legitimate software providers."
- The Treasurer online, 9 December 2021.