home bbs files messages ]

Just a sample of the Echomail archive

<< oldest | < older | list | newer > | newest >> ]

 Message 1904 
 Mike Powell to All 
 Thousands fall victim to 
 03 Nov 25 09:22:27 
 
TZUTC: -0500
MSGID: 1661.consprcy@1:2320/105 2d6df720
PID: Synchronet 3.21a-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0
TID: SBBSecho 3.28-Linux master/123f2d28a Jul 12 2025 GCC 12.2.0
BBSID: CAPCITY2
CHRS: ASCII 1
FORMAT: flowed
Thousands fall victim to ransomware as European attacks reach record highs -
here's why they're so at risk

Date:
Mon, 03 Nov 2025 11:05:24 +0000

Description:
European ransomware victims make up nearly 22% of global targets, report
claims.

FULL STORY

European companies are increasingly the targets of ransomware and extortion,
new research from CrowdStrike has claimed, with the region now accounting for
almost 22% of global ransomware victims, second only behind North America. 

Since 2024, over 2,100 victims have been posted on extortion leak sites 
across the continent - making European firms twice as likely to be targeted
than those in the Asia Pacific, and the view that richer companies can pay
higher ransoms makes them attractive targets. 

The strict GDPR regulations and heavy penalties that come with violations 
have created the perception that European companies are more likely to pay
ransom demands, with lucrative industries like manufacturing, professional
service, and technology most commonly targeted. 

Evolving threats

No matter where in the world you are, the ransom attack tactics and 
techniques usually stay pretty similar. Credentials are dumped from backups,
files are remotely encrypted, access is leveraged to unmanaged systems in
order to steal data and deploy the ransomware, and Linux ransomware on VMware
EsXI infrastructure is deployed. 

Although it's a common playbook, its quicker than ever for criminals to
execute this, with adversaries averaging just 35.5 hours between initial
access and ransomware deployment - meaning security teams are scrambling to
protect themselves after they detect an incident, even if they know what's
coming. 

Geopolitics plays an important role in European attacks, with the war in
Ukraine driving politically motivated hacktivist groups to target supporters
on each side, collecting information and disabling services. 

The cyber battlefield in Europe is more crowded and complex than ever, said
Adam Meyers, head of Counter Adversary Operations at CrowdStrike. 

Were seeing a dangerous convergence of criminal innovation and geopolitical
ambition, with ransomware crews using enterprise-grade tools and state-backed
actors exploiting global crises to disrupt, persist, and conduct espionage. 
In this high-stakes environment, intelligence-led defense powered by AI and
guided by human expertise is the only combination designed to stop cyber
threats.

======================================================================
Link to news story:
https://www.techradar.com/pro/security/thousands-fall-victim-to-ransomware-as-
european-attacks-reach-record-highs-heres-why-theyre-so-at-risk

$$
--- SBBSecho 3.28-Linux
 * Origin: capitolcityonline.net * Telnet/SSH:2022/HTTP (1:2320/105)
SEEN-BY: 105/81 106/201 128/187 129/14 305 153/7715 154/110 218/700
SEEN-BY: 226/30 227/114 229/110 206 300 307 317 400 426 428 470 664
SEEN-BY: 229/700 705 266/512 291/111 320/219 322/757 342/200 396/45
SEEN-BY: 460/58 633/280 712/848 902/26 2320/0 105 304 3634/12 5075/35
PATH: 2320/105 229/426


<< oldest | < older | list | newer > | newest >> ]

(c) 1994,  bbs@darkrealms.ca