Skip to Main Content

Resources

Providing you the latest industry-specific news and insights.

  • article

    Egregor: The Ghost of Soviet Bears Past Haunts On

    Egregor ransomware, a sophisticated RaaS platform, uses data exfiltration and brazen negotiation tactics to target major sectors like manufacturing and retail and caters to experienced affiliates.

    Read more
  • article

    The Road Back: Recovery from a Malware Attack in the Long Term

    Arete Incident Response is currently answering the call of duty for about 60 companies per month who have experienced malware intrusions.  These are mostly ransomware or business email compromise attacks.  Arete’s primary goal is to restore what was…

    Read more
  • podcast

    Nation State Threats with Jim Jaeger

    In this episode, Kevin Smith and Stephen Ramey talk to Arete's chief cyber strategist, Jim Jaeger, about nation state threats, ways to keep your business safe from ransomware, and more!

    Read more
  • article

    Universal Encryption

    Ransomware variants like Ryuk, WastedLocker, and Dopplepaymer are also file level encryption. These groups will gain access to the network and perform reconnaissance to identify the victim, understand their business, identify critical sys­tems, and…

    Read more
  • article

    System Specific Encryption

    Ransomware variants like Phobos, Dharma or CryLock are file level encryption. The TA gains access to the system, copies specific encryption executables onto the systems then runs the executables to encrypt the files. The results are files with a new…

    Read more
  • article

    Maze Ransomware: Is Posting Data Counterproductive?

    In 2020, Maze Ransomware began utilizing both encryption and data exfiltration in an attempt to maximize ransom payments, but these tactics may backfire by adding additional incident response costs for victims.

    Read more