Ransomware Distributors are Increasingly Threatening Data Exposure

NJCCIC Alert

Original Release Date: 8/28/2020

Summary

In late 2019, ransomware threat actors began threatening to release data stolen from victim networks if ransom demands were not paid. This tactic is increasingly common, and is consistent with recent incident reports submitted to the NJCCIC. Additionally, several threat actors – Darkside being one of the newest – are also running leak sites, which are used to upload stolen victim data. Threat actors threaten to release stolen data as an added pressure to pay ransoms, even when victims have usable data backups. The University of Utah is a recent ransomware victim that chose to pay the ransom demand due to the sensitivity of the data that was stolen by the threat actors.

Recommendations

The NJCCIC recommends businesses and organizations ensure they have a comprehensive data backup plan that includes keeping multiple, tested copies off the network, with at least one copy kept in a separate and secure location. Additionally, organizations are advised to keep any sensitive network data encrypted at rest and in transit to prevent threat actors from publicly exposing any stolen data. We encourage users and administrators to review and implement the recommendations in the NJCCIC Ransomware: Risk Mitigation Strategies guide.

New Jersey Cybersecurity & Communications Integration Cell

2 Schwarzkopf Dr, Ewing Township, NJ 08628

njccic@cyber.nj.gov

OUR COMMITMENT

The NJCCIC is a component organization within the New Jersey Office of Homeland Security and Preparedness. We are the State's one-stop-shop for cyber threat analysis, incident reporting, and information sharing and are committed to making New Jersey more resilient to cyber threats by spreading awareness and promoting the adoption of best practices.

Agency Seals of State of NJ, NJOHSP and NJCCIC

STAY CONNECTED:

View our Privacy Policy here.

View our Site Index here.