Just a sample of the Echomail archive
[ << oldest | < older | list | newer > | newest >> ]
|  Message 1904  |
|  Mike Powell to All  |
|  Thousands fall victim to  |
|  03 Nov 25 09:22:27  |
 TZUTC: -0500 MSGID: 1661.consprcy@1:2320/105 2d6df720 PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0 TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0 BBSID: CAPCITY2 CHRS: ASCII 1 FORMAT: flowed Thousands fall victim to ransomware as European attacks reach record highs - here's why they're so at risk Date: Mon, 03 Nov 2025 11:05:24 +0000 Description: European ransomware victims make up nearly 22% of global targets, report claims. FULL STORY European companies are increasingly the targets of ransomware and extortion, new research from CrowdStrike has claimed, with the region now accounting for almost 22% of global ransomware victims, second only behind North America. Since 2024, over 2,100 victims have been posted on extortion leak sites across the continent - making European firms twice as likely to be targeted than those in the Asia Pacific, and the view that richer companies can pay higher ransoms makes them attractive targets. The strict GDPR regulations and heavy penalties that come with violations have created the perception that European companies are more likely to pay ransom demands, with lucrative industries like manufacturing, professional service, and technology most commonly targeted. Evolving threats No matter where in the world you are, the ransom attack tactics and techniques usually stay pretty similar. Credentials are dumped from backups, files are remotely encrypted, access is leveraged to unmanaged systems in order to steal data and deploy the ransomware, and Linux ransomware on VMware EsXI infrastructure is deployed. Although it's a common playbook, its quicker than ever for criminals to execute this, with adversaries averaging just 35.5 hours between initial access and ransomware deployment - meaning security teams are scrambling to protect themselves after they detect an incident, even if they know what's coming. Geopolitics plays an important role in European attacks, with the war in Ukraine driving politically motivated hacktivist groups to target supporters on each side, collecting information and disabling services. The cyber battlefield in Europe is more crowded and complex than ever, said Adam Meyers, head of Counter Adversary Operations at CrowdStrike. Were seeing a dangerous convergence of criminal innovation and geopolitical ambition, with ransomware crews using enterprise-grade tools and state-backed actors exploiting global crises to disrupt, persist, and conduct espionage. In this high-stakes environment, intelligence-led defense powered by AI and guided by human expertise is the only combination designed to stop cyber threats. ====================================================================== Link to news story: https://www.techradar.com/pro/security/thousands-fall-victim-to-ransomware-as- european-attacks-reach-record-highs-heres-why-theyre-so-at-risk $$ --- SBBSecho 3.28-Linux * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105) SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700 SEEN-BY: 226/30 227/114 229/110 206 300 307 317 400 426 428 470 664 SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45 SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35 PATH: 2320/105 229/426 |
[ << oldest | < older | list | newer > | newest >> ]