RANSOMWARE THREATS

Attackers are holding organizations hostage

Ransomware has evolved from high-volume and “spray and pray” tactics to a more focused “stay and play” model, where operators take their time to learn the victims and their networks, and then swiftly infect hosts. Besides encrypting data, an increasing number of adversaries now exfiltrate and threaten to publish stolen data to increase ransom payments.


UNIT 42

Expert-led readiness assessments

RANSOMWARE READINESS ASSESSMENT

RANSOMWARE READINESS ASSESSMENT

The Unit 42 Ransomware Readiness Assessment focuses on preparing your people, processes and technologies to mitigate the ransomware threat. We work with you to develop control enhancements, remediation recommendations and a playbook based on the latest best practices and threat intelligence to achieve a target state of ransomware readiness, helping you to:

  • Avoid attacks with ransomware safeguards
  • Recover faster with a best practice response playbook
  • Test your readiness with a ransomware tabletop exercise
  • Put our team on speed dial with SLA-driven response times

OR

COMPLETE RANSOMWARE ANALYSIS

COMPLETE RANSOMWARE ANALYSIS

Threat actors and ransomware can dwell in networks and on endpoints for months before encrypting files. The Complete Ransomware Analysis addresses this challenge with a ransomware-focused compromise assessment. Using Unit 42 threat intelligence and advanced forensics, we'll work with you to scan endpoints in your environment, review forensic artifacts and collect endpoint telemetry to uncover evidence of malicious files or activity often associated with early stages of the ransomware lifecycle. This option includes:

  • A full Ransomware Readiness Assessment
  • Analysis of endpoint scan findings
  • A review of your response plan and recommendations to strengthen it

Wendi Whitmore
Wendi Whitmore SVP, Unit 42
quote

Ransomware is the most pernicious cyberthreat organizations face today. Cyber extortion has reached crisis levels. Yet Unit 42’s message remains the same: Don’t panic. There’s help available.

Wendi Whitmore SVP, Unit 42
DATASHEET

Ransomware Readiness Assessment Datasheet

Learn how you can achieve a target state of ransomware readiness in this datasheet.

WEBINAR

DarkSide Attacks & Ransomware Threat Update

Join us for a Unit 42 Briefing by VP, Unit 42 Threat Intelligence, Ryan Olson.

DATASHEET

Cybersecurity Expertise Retainer

Learn how you can put the world-class Unit 42 Incident Response team on speed dial in this datasheet.

REPORT

Unit 42 Ransomware Threat Report

Based on Unit 42 research and case data, this report exposes the latest ransomware threats and provides visibility into how the threats exploited business vulnerabilities in 2020.

BLOG POST

The Ransomware Threat: Bigger, Greedier, Attacking the Most Vulnerable

The ransomware threat is growing, but it can be mitigated. Find out ransomware trends and how to prevent and respond to attacks.

WEBINAR

Unit 42 Ransomware Threat Report Webinar

Get actionable insight into adversaries’ methods and operations, the latest ransomware variants, and how these threats exploited business vulnerabilities during a tumultuous 2020.

WEBINAR

Best Practices for Stopping Ransomware

Hear about some of the most advanced ransomware attacks of 2020 and learn what steps you can take to avoid an attack.

CASE STUDY

Database Exposure Investigation

A popular online social media site inadvertently exposed consumer data. They needed an investigation to determine what happened, the scope of exposure, and how to properly secure their servers.