Providing you the latest industry-specific news and insights.
Maze Ransomware: Is Posting Data Counterproductive?
Ransomware incidents dominated INFOSEC news in 2019. Penetration methods continued to evolve, attacks became more targeted and ransom demands continued to rise. A major shift in attacker tactics happened in early December when the group behind the…Read more
What To Do When A Hacker Encrypts Your Data
What should your first step be when a hacker cracks your system? Evgueni Erchov, Arete's head of security research & strategy shares insight with Risk & Insrance's Autumn Demberger.Read more
Cybersecurity in the Age of Ransomware. It’s More Than Simply Having Insurance.
BY KEVIN BAKER In many ways, cybersecurity insurance is not so different from car or home insurance. In short, it’s a way to transfer risk. If a cyber incident occurs, insurance can help organizations gain a level of mitigating control and…Read more
Surtr Ransomware Pays Tribute to REvil
Executive Summary In February 2022, Arete investigated a Surtr ransomware incident where the ransomware author(s) paid tribute to the now defunct REvil (aka Sodinokibi) group by making a registry key change to the infected host. REvil was…Read more
Fool Us Once … BlackMatter Initial Access Tactics Point to a Possible REvil Association
BY CYBER THREAT INTELLIGENCE TEAM Arete observed an overlap between a recent BlackMatter case and a Q1 2021 REvil case. In both instances, the actors leveraged the NodeJS-based Gootloader to deliver a CobaltStrike payload. In a March 2021 insight,…Read more
PYSA: 2020 to Now
BY ARETE CYBER THREAT INTELLIGENCE TEAM PYSA is the newest variant of the Mespinoza Ransomware as a Service (RaaS) family, which was first observed infecting victims in the wild in December 2019. PYSA is likely a reference to the open-source web…Read more
Endpoint Detection and Response: The Closest Thing to a Silver Bullet to Stop Ransomware
By Paul Caron In its recent report “Combating Ransomware,” the Ransomware Task Force says there’s no silver bullet to solving the ransomware challenge. Instead, the group touts a multi-pronged approach and provides an extensive list of…Read more