FINAL WORD
substantial trust issues between customers , partners and the public .
• Regulatory fines . Companies that handle personal or sensitive data are subject to a variety of government and industry data protection regulations . In the event of a data breach , hefty fines and legal repercussions can compound the financial impact – making the situation even more challenging .
BianLian is a model of unencrypted ransomware
An example of a cybercriminal group that has switched to unencrypted ransomware is BianLian .
According to a cybersecurity advisory released by the FBI , CISA and the Australian
In recent months , cybercriminals have introduced yet another technique to their arsenal : unencrypted attacks .
Cyber Security Center , BianLian has been targeting critical infrastructure and organizations in the US and Australia since June 2022 .
The criminal group originally leveraged a double extortion model , but as of this year , it has primarily migrated to exfiltration-based extortion .
It appears that BianLian has recently targeted the Save the Children tag .
The group claims to have stolen 6.8 TB of the non-profit ’ s data , including financial , personal and medical information .
That investigation is still on-going .
The search for alignment with the Zero Trust model
Some forecasts indicate that ransomware will cost victims somewhere around US $ 265 billion per year by 2031 .
Enterprises need to be proactive and establish a Zero Trust Network Access security framework to effectively confront unencrypted attacks as well as the evolving ransomware threat landscape .
The guiding principle behind Zero Trust is : don ’ t trust blindly ; Always check . Currently , nearly 90 % of all Internet traffic is encrypted and most malware and threats are hidden in encrypted traffic .
If you want to keep your applications , your data and your organization safe from ransomware – and get a comprehensive , Zero Trust environment – you need to
encrypt these assets .
Orchestrating defense in a multicloud environment
One of the challenges of this strategy – intensifying the use of advanced encryption solutions to make it harder for criminals to access critical data – is that it has to be done in a way that doesn ’ t impact the user experience . The work of encrypting and decrypting critical data must be carried out with maximum performance and accuracy .
A cloud platform that orchestrates this process with the help of AI and ML resources can offer the necessary elasticity to preserve , for example , consumer engagement with large B2C portals – you gain in safety without increasing friction .
In the fluid world of the digital economy , the power of an encryption and decryption platform has to be distributed across the many clouds according to each organization ’ s business logic .
This is critical to exposing threats and stopping chains of ransomware attacks .
The goal is to prevent attackers from being able to monetize the crime through blackmail that affects the value of the brand . •
52 www . intelligenttechchannels . com / latam