Client: Akamai Technologies GmbH
Format: Whitepaper
Size: 3.2 MB
Language: English
Date: 17.05.2024

Ransomware on the Move

Evolving Exploitation Techniques and the Active Pursuit of Zero-Days
 
In the evolving ransomware landscape, adversaries are increasingly shifting from phishing to vulnerability exploitation, enhancing both the scope and sophistication of their attacks. Our previous report, "Slipping Through the Security Gaps," detailed this trend, highlighting how ransomware groups aggressively exploit vulnerabilities and use methods like in-house zero-day attack development and bug bounty programs. These groups are willing to invest financially, either by paying hackers to find flaws in their ransomware software or by purchasing access to targets through initial access brokers (IABs).
Free Download
Please enter your contact information and click the download button. You will receive an email with your download link.
I consent to B2B Media Group GmbH with its affiliated companies and Akamai Technologies GmbH processing my data for marketing purposes, in particular for marketing-related contact via email and telephone.

You can withdraw your consent at any time by emailing privacy@b2bmg.com (subject: Akamai Technologies GmbH). Further information can be found in the Privacy Notice.

Privacy / download conditions:

Date: 1.8.2018

Client

  • B2B Media Group GmbH, Bahnhofstraße 5, 91245 Simmelsdorf (B2B MG)

Partner

  • Akamai Technologies GmbH
Fields marked with * are mandatory