Fall Regulatory Summit

Internal Use Only

Current Threat Environment • Ransomware groups are adopting new tactics • Using encryption and data exfiltration, sometimes with accompanying DDoS attacks, to pressure victims to pay demanded ransoms • Some forego encryption altogether to focus on data exfiltration to extort victims with stolen data (e.g., Clop and MOVEit Transfer attack) • Ransomware-as-a-Service (RaaS) and access brokers have made execution of ransomware attacks easier for unsophisticated criminals • Other forms of cyber attacks • DDoS, particularly among hacktivist groups

Made with FlippingBook. PDF to flipbook with ease