DataBreaches.net is reporting new details on the Broward County Public Schools ransomware attack – including that the attackers initially demanded $40 million US, and the contents of the initial exchange between the threat actors and the district.
Experts Comments
The securing of kids’ identities is another critical element in securing our future.
This particular threat actor group is woefully underinformed, and based on their ransomware assumptions, is likely not from the US.
US school districts may appear to some have large budgets, but almost all of those budgets are committed to ongoing expenses that are deeply and contractually committed. There’s little to no discretionary budget, and even core resources are underfunded. Not all that long ago, my public school textbooks were covered in years’ worth of markings from other
.....Read MoreDot Your Expert Comments
Only for registered and approved experts. Please register before providing comments. Register here
The attack on Broward County Public Schools is yet another example of how ransomware gangs haven’t missed a beat in preying on the security vulnerabilities associated with remote learning. While there have been numerous attacks targeting education institutions over the last couple of weeks, this specific attack is unique in that its ransom demand was one of the highest ever. Given that every major attack sets a precedent for others to emulate, we’ll likely see other threat actors one-up
.....Read MoreThe attack on Broward County Public Schools is yet another example of how ransomware gangs haven’t missed a beat in preying on the security vulnerabilities associated with remote learning. While there have been numerous attacks targeting education institutions over the last couple of weeks, this specific attack is unique in that its ransom demand was one of the highest ever. Given that every major attack sets a precedent for others to emulate, we’ll likely see other threat actors one-up each other beyond what is currently making headlines.
While never paying a ransom demand is certainly best practice, sometimes businesses don’t take the necessary precautions that would give them a way out. This includes conducting regular vulnerability and risk assessments, which helps companies understand their level of risk. Ideally, this will be done by automating scanning and remediation processes to reduce IT team fatigue and improve productivity. Additionally, IT security teams should take a backup of confidential data, ensuring their data remains protected and recoverable in times of crisis.
Read LessLinkedin Message
@Chandrashekhar Basavanna , CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Given that every major attack sets a precedent for others to emulate, we’ll likely see other threat actors one-up each other beyond what is currently..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reaction-on-broward-district-attacker-demanded-40mil-ransom
Facebook Message
@Chandrashekhar Basavanna , CEO, provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Given that every major attack sets a precedent for others to emulate, we’ll likely see other threat actors one-up each other beyond what is currently..."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/expert-reaction-on-broward-district-attacker-demanded-40mil-ransom