{"id":6408,"date":"2021-06-11T10:46:04","date_gmt":"2021-06-11T17:46:04","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6408"},"modified":"2024-08-07T12:20:58","modified_gmt":"2024-08-07T19:20:58","slug":"ransomwares-assault-on-critical-industries","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/","title":{"rendered":"Ransomware\u2019s Assault on Critical Industries"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Andy Warhol, the famous artist, film director, and producer, said in 1968 that \u201cin the future, everyone would be famous for 15 minutes.\u201d Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just this month, top Justice Department officials cautioned U.S. business leaders to prepare for an increasing barrage of ransomware attacks. The Federal government&#8217;s efforts to organize a\u00a0 coordinated response have taken on an almost war-room effort as they seek to rally business to prepare for these increased attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Lisa Monaco, the deputy attorney general, noted that \u201cto the CEOs around the country, you&#8217;ve got to be on notice of the exponential increase of these (ransomware) attacks.\u201d Monaco also recently issued a memorandum to the US\u2019s federal prosecutors requiring the centralization of ransomware reporting. Monaco also wrote, \u201cif you are not taking steps-today, right now-to understand how you can make your company more resilient, what is your plan?\u00b9<\/span><span style=\"font-weight: 400;\">\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The attacks we see in the news are only the tip of an iceberg which is largely out of view of the public eye. Monaco has been on point for the DOJ\u2019s efforts against ransomware threat actors, and noted that the massive attacks against Colonial Pipeline and JBS USA, the largest meat processing company in the world, were representative of the ransomware attacks taking place every day.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just this past week it was announced that JBS paid an $11 million dollar ransom after a cyberattack that shut down its entire US beef processing operation. At this time, the US government believes the ransomware attack was done by the threat actors REvil, likely based in Russia or eastern Europe. REvil is a ransomware-as-a-service threat actor that has successfully taken money from many organizations over the past year. REvil has also been known as <\/span><a href=\"https:\/\/insights.infoblox.com\/threat-intelligence-reports\/threat-intelligence--21\"><span style=\"font-weight: 400;\">Sodinokibi<\/span><\/a><span style=\"font-weight: 400;\"> and may be linked to another ransomware threat actor, GandCrab.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Colonial Pipeline ransomware attack was also a very dangerous attack. In this attack, the threat actors deployed <\/span><a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/\"><span style=\"font-weight: 400;\">DarkSide<\/span><\/a><span style=\"font-weight: 400;\"> ransomware against the pipeline company\u2019s critical IT infrastructure, causing the company to take the precautionary measure of shutting down 5,550 miles of the pipeline, which left fuel stranded on the Gulf Coast.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DarkSide is a ransomware-as-a-service (RaaS), where the threat actors who deploy the ransomware share a percentage of the profits with the ransomware developers. Threat actors use DarkSide to encrypt and steal sensitive data, and have been known to target large, high-revenue organizations that can afford to pay large ransoms.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once the DarkSide actors gain access to a victim\u2019s network, they deploy the ransomware to encrypt and exfiltrate sensitive data. The actors then use a double extortion method where they threaten to publicly release this data to pressure the victims into paying the ransom demand, as well as demand another ransom for a digital key to decrypt their files.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DarkSide has not emerged from this attack unscathed. U.S. Law enforcement has placed a strong counter-punch and <\/span><a href=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-seizes-23-million-cryptocurrency-paid-ransomware-extortionists-darkside\"><span style=\"font-weight: 400;\">recovered $2.3 million<\/span><\/a><span style=\"font-weight: 400;\"> in bitcoin paid in the Colonial Pipeline ransome. U.S. officials identified a virtual currency wallet used by the DarkSide threat actors that was used to collect payment from Colonial Pipeline\u00b2<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, the rabbit hole may go far deeper than that. Cryptocurrency may be the key to a strong counterpunch. The U.S. government has not revealed their ways and means or the full extent of the Federal agencies involved in recovering the $2.3 million and may now have far deeper visibility than we know into cryptocurrency transactions. In the final analysis the use of ransomware is almost wholly dependent on cryptocurrency. Without a secure and confidential cryptocurrency, ransomware threat actors might be driven out of business.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The US Government Decides to Step In<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Given the increasing tide of ransomware attacks, and the threat of burgeoning investment by threat actors in ransomware-as-a-service platforms, the U.S. Government White House has also gone on record this month about the extreme dangers of ransomware. Earlier in May President Biden signed an <\/span><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/statements-releases\/2021\/05\/12\/fact-sheet-president-signs-executive-order-charting-new-course-to-improve-the-nations-cybersecurity-and-protect-federal-government-networks\/\"><span style=\"font-weight: 400;\">Executive Order<\/span><\/a><span style=\"font-weight: 400;\"> to improve the nation\u2019s cybersecurity and protect Federal government networks. This Executive Order makes a significant contribution toward modernizing cybersecurity defenses by protecting federal networks, improving information-sharing between the U.S. government and the private sector on cyber issues, and strengthening the United States\u2019 ability to respond to incidents when they occur.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anne Neuberger, President Joe Biden\u2019s deputy national security advisor for cyber and emerging technology has noted that, \u201cThe threats (ransomware) are serious and they are increasing.\u201d Neuberger further wrote, \u201cThe private sector also has a critical responsibility to protect against these threats. All organizations must recognize that no company is safe from being targeted by ransomware, regardless of size or location \u2026 to understand your risk, business executives should immediately convene their leadership teams to discuss the ransomware threat and review corporate security posture and business continuity plans to ensure you have the ability to continue or quickly restore operations,\u201d Neuberger added<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This recent White House memo circulated internally in June has been cited by CNBC as listing five best practices for safeguarding against ransomware attacks:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Backup your data, system images, and configurations, regularly test them, and keep the backups offline<\/b><span style=\"font-weight: 400;\">: Ensure that backups are regularly tested and that they are not connected to the business network, as many ransomware variants try to find and encrypt or delete accessible backups. Maintaining current backups offline is critical because if your network data is encrypted with ransomware, your organization can restore systems.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Update and patch systems promptly<\/b><span style=\"font-weight: 400;\">: This includes maintaining the security of operating systems, applications, and firmware, in a timely manner. Consider using a centralized patch management system; use a risk-based assessment strategy to drive your patch management program.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Test your incident response plan:<\/b><span style=\"font-weight: 400;\"> There\u2019s nothing that shows the gaps in plans more than testing them. Run through some core questions and use those to build an incident response plan: Are you able to sustain business operations without access to certain systems? For how long? Would you turn off your manufacturing operations if business systems such as billing were offline?<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Check your security team\u2019s work<\/b><span style=\"font-weight: 400;\">: Use a 3rd party pen tester to test the security of your systems and your ability to defend against a sophisticated attack. Many ransomware criminals are aggressive and sophisticated and will find the equivalent of unlocked doors.<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Segment your networks<\/b><span style=\"font-weight: 400;\">: There\u2019s been a recent shift in ransomware attacks \u2013 from stealing data to disrupting operations. It\u2019s critically important that your corporate business functions and manufacturing\/production operations are separated and that you carefully filter and limit internet access to operational networks, identify links between these networks and develop workarounds or manual controls to ensure ICS networks can be isolated and continue operating if your corporate network is compromised. Regularly test contingency plans such as manual controls so that safety-critical functions can be maintained during a cyber incident.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">DNS security as a first line of defense<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">DNS security must also be a critical part of your ransomware defense. Ransomware and most malware use DNS at one or more stages of the cyber kill chain.\u00a0 DNS may be used during the reconnaissance phase when it is a targeted attack. DNS is also used in the delivery phase as potential victims unknowingly make DNS queries for IP addresses involved in the attack. DNS will also be used in the email delivery process when the ransomware propagates via spam campaigns.\u00a0 The exploitation phase may involve DNS queries when the victim\u2019s system is compromised and infected. DNS is also frequently used when an infected system checks in with the command and control (C&amp;C) infrastructure. Using threat intelligence and analytics on your internal DNS can detect and block such nefarious activity early before ransomware spreads or downloads the encryption software.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">BloxOne\u00ae Threat Defense from Infoblox operates at the DNS level to see threats that other solutions do not see and can stop ransomware and other attacks earlier in the attack cycle. BloxOne Threat Defense brings advanced automation and ecosystem integrations, increased efficiencies in SecOps, increased effectiveness of the existing security stack and secures digital and work-from-anywhere efforts. All of this can reduce the total cost for cybersecurity for any organization. To learn more about BloxOne Threat Defense: <\/span><a href=\"https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/\"><span style=\"font-weight: 400;\">https:\/\/www.infoblox.com\/products\/bloxone-threat-defense\/<\/span><\/a><\/p>\n<p>\u00b9<a href=\"https:\/\/www.cnbc.com\/2021\/06\/04\/ceos-need-to-prepare-for-increase-in-ransomware-attacks-doj-official.html\">https:\/\/www.cnbc.com\/2021\/06\/04\/ceos-need-to-prepare-for-increase-in-ransomware-attacks-doj-official.html<\/a><\/p>\n<p>\u00b2<a href=\"https:\/\/www.cnbc.com\/2021\/06\/07\/us-recovers-some-of-the-money-paid-in-the-colonial-pipeline-ransom-officials-say.html\">https:\/\/www.cnbc.com\/2021\/06\/07\/us-recovers-some-of-the-money-paid-in-the-colonial-pipeline-ransom-officials-say.html<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Andy Warhol, the famous artist, film director, and producer, said in 1968 that \u201cin the future, everyone would be famous for 15 minutes.\u201d Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the [&hellip;]<\/p>\n","protected":false},"author":324,"featured_media":5624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[288,333,513,514,515,498,189],"class_list":{"0":"post-6408","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-ransomware","9":"tag-cyberattack","10":"tag-jbs","11":"tag-raas","12":"tag-revil","13":"tag-colonial-pipeline","14":"tag-cybersecurity","15":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware\u2019s Assault on Critical Industries<\/title>\n<meta name=\"description\" content=\"Ransomware\u2019s Assault on Critical Industries. Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware\u2019s Assault on Critical Industries\" \/>\n<meta property=\"og:description\" content=\"Ransomware\u2019s Assault on Critical Industries. Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-11T17:46:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-07T19:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png\" \/>\n\t<meta property=\"og:image:width\" content=\"293\" \/>\n\t<meta property=\"og:image:height\" content=\"249\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michael Zuckerman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Zuckerman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/\"},\"author\":{\"name\":\"Michael Zuckerman\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\"},\"headline\":\"Ransomware\u2019s Assault on Critical Industries\",\"datePublished\":\"2021-06-11T17:46:04+00:00\",\"dateModified\":\"2024-08-07T19:20:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/\"},\"wordCount\":1456,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png\",\"keywords\":[\"Ransomware\",\"Cyberattack\",\"JBS\",\"RaaS\",\"REvil\",\"Colonial Pipeline\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/\",\"name\":\"Ransomware\u2019s Assault on Critical Industries\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png\",\"datePublished\":\"2021-06-11T17:46:04+00:00\",\"dateModified\":\"2024-08-07T19:20:58+00:00\",\"description\":\"Ransomware\u2019s Assault on Critical Industries. Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png\",\"width\":293,\"height\":249},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/ransomwares-assault-on-critical-industries\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware\u2019s Assault on Critical Industries\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/212816c17be869578ba1574b5fc7abf4\",\"name\":\"Michael Zuckerman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_324_1628613720-96x96.jpg\",\"caption\":\"Michael Zuckerman\"},\"description\":\"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/michael-zuckerman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware\u2019s Assault on Critical Industries","description":"Ransomware\u2019s Assault on Critical Industries. Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware\u2019s Assault on Critical Industries","og_description":"Ransomware\u2019s Assault on Critical Industries. Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/","og_site_name":"Infoblox Blog","article_published_time":"2021-06-11T17:46:04+00:00","article_modified_time":"2024-08-07T19:20:58+00:00","og_image":[{"width":293,"height":249,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png","type":"image\/png"}],"author":"Michael Zuckerman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Zuckerman","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/"},"author":{"name":"Michael Zuckerman","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4"},"headline":"Ransomware\u2019s Assault on Critical Industries","datePublished":"2021-06-11T17:46:04+00:00","dateModified":"2024-08-07T19:20:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/"},"wordCount":1456,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png","keywords":["Ransomware","Cyberattack","JBS","RaaS","REvil","Colonial Pipeline","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/","url":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/","name":"Ransomware\u2019s Assault on Critical Industries","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png","datePublished":"2021-06-11T17:46:04+00:00","dateModified":"2024-08-07T19:20:58+00:00","description":"Ransomware\u2019s Assault on Critical Industries. Ransomware attacks have stepped up and are commanding attention like never before. Unfortunately, this first 15 minutes of fame may be the first of many such periods that we\u2019ll see over the coming years. Ransomware has become the threat actor\u2019s weapon of choice. Ransomware attacks are being more frequently carried out by nation-states and organized crime and causing millions in dollars of reputational damage, recovery expense, extorted ransom payments, loss of revenue, inability to use critical infrastructure, and much more.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Sanction-Risks-for-Faclicitating-Ransomeware-Payments.png","width":293,"height":249},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/ransomwares-assault-on-critical-industries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Ransomware\u2019s Assault on Critical Industries"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/212816c17be869578ba1574b5fc7abf4","name":"Michael Zuckerman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_324_1628613720-96x96.jpg","caption":"Michael Zuckerman"},"description":"Michael Zuckerman is a seasoned B2B product marketing and marketing strategy consultant with experience in the cybersecurity marketplace. Zuckerman\u2019s domain experience in cybersecurity over the past 10 years includes DNS security, threat intelligence, threat intelligence platforms (TIP), container security, mobile device security, moving target defense, network threat analysis (AI), sandbox, deception technology, cloud access security brokers (CASB), SASE, AI based SIEM, secure collaborative governance, and related technology sets to include data loss prevention (DLP), user and entity behavior analytics (UEBA), and encryption.","url":"https:\/\/www.infoblox.com\/blog\/author\/michael-zuckerman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/324"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6408"}],"version-history":[{"count":2,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6408\/revisions"}],"predecessor-version":[{"id":6410,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6408\/revisions\/6410"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/5624"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}