Ransomware has come to dominate the current security discourse, appearing ever more frequently in security news reports. And those are only the cases we hear about. Businesses of all sizes and kinds are being held ransom in the modern “double extortion” variant of this insidious crime.
The purpose of this report is to provide technical guidance to CISOs and security managers concerned with the threat of cyber extortion. However, it is essential to note that cyber extortion is not actually a “technology” problem, and therefore technical controls alone will ultimately not fully resolve it.