TALKING
‘‘ business compared to encryption-based attacks , make this technique worrisome .
Here are the results of data-free attacks :
• Faster ransom demands . With unencrypted attacks , cybercriminals can demand a ransom more quickly since they eliminate the encryption step . Victims find themselves under heavy pressure to pay and prevent their data from being exposed .
• Reputational damage . The mere threat of data exposure can have a strong impact on businesses . Stolen confidential information , including customer data , financial records or intellectual property , can lead to substantial trust issues between customers , partners and the public .
• Regulatory fines . Companies that handle personal or sensitive data are subject to a variety of government and industry data protection regulations . In the event of a data breach , hefty fines and legal repercussions can compound the financial impact – making the situation even more challenging . confront unencrypted attacks as well as the evolving ransomware threat landscape .
The guiding principle behind zero trust is : don ’ t trust blindly ; Always check .
Currently , nearly 90 % of all Internet traffic is encrypted and most malware and threats are hidden in encrypted traffic .
BianLian is a model of unencrypted ransomware
An example of a cybercriminal group that has switched to unencrypted ransomware is BianLian .
According to a cybersecurity advisory released by the FBI , CISA , and the Australian Cyber Security Center , BianLian has been targeting critical infrastructure and organizations in the US and Australia since June 2022 .
The criminal group originally leveraged a double extortion model , but as of this year , it has primarily migrated to exfiltration-based extortion .
It appears that BianLian has recently targeted the Save the Children tag .
The group claims to have stolen 6.8 TB of the nonprofit ’ s data , including financial , personal and medical information .
If you want to keep your applications , your data and your organization safe from ransomware – and get a comprehensive , zero-trust environment – you need to encrypt these assets .
Orchestrating Defense in a Multi-cloud Environment
One of the challenges of this strategy – intensifying the use of advanced encryption solutions to make it harder for criminals to access critical data – is that it has to be done in a way that doesn ’ t impact the user experience . The work of encrypting and decrypting critical data must be carried out with maximum performance and accuracy .
A cloud platform that orchestrates this process with the help of AI and ML resources can offer the necessary elasticity to preserve , for example , consumer engagement with large B2C portals – you gain in safety without increasing friction .
That investigation is still ongoing .
The search for alignment with the Zero Trust model
In the fluid world of the digital economy , the power of an encryption and decryption platform has to be distributed across the many clouds according to each organization ’ s business logic .
Some forecasts indicate that ransomware will cost victims somewhere around US $ 265 billion per year by 2031 .
Enterprises need to be proactive and establish a Zero Trust Network Access security framework to effectively
This is critical to exposing threats and stopping chains of ransomware attacks .
The goal is to prevent attackers from being able to monetize the crime through blackmail that affects the value of the brand . p
34 INTELLIGENTCIO LATAM www . intelligentcio . com