www.helpnetsecurity.com Open in urlscan Pro
52.40.114.121  Public Scan

URL: https://www.helpnetsecurity.com/2024/05/08/ransomware-law-enforcement-help/
Submission: On May 09 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1715220758"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Help Net Security
May 8, 2024
Share


97% OF ORGANIZATIONS HIT BY RANSOMWARE TURN TO LAW ENFORCEMENT



Sophos has released additional findings from its annual “State of Ransomware
2024” survey. According to the report, among organizations surveyed, 97% of
those hit by ransomware over the past year engaged with law enforcement and/or
official government bodies for help with the attack.



In addition, 59% of those organizations that did engage with law enforcement
found the process easy or somewhat easy. Only 10% of those surveyed said the
process was very difficult.

Based on the survey, impacted organizations reached out to law enforcement
and/or official government bodies for a range of assistance with ransomware
attacks. 61% reported they had received advice on dealing with ransomware, while
60% received help investigating the attack. 58% of those that had their data
encrypted received help from law enforcement to recover their data from the
ransomware attack.

“Companies have traditionally shied away from engaging with law enforcement for
fear of their attack becoming public. If they are known to have been victimized
it could impact their business reputation and make a bad situation worse. Victim
shaming has long been a consequence of an attack, but we’ve made progress on
that front, both within the security community and at the government level. New
regulations on cyber incident reporting, for example, appear to have normalized
engaging with law enforcement, and this survey data shows organizations are
taking steps in the right direction,” said Chester Wisniewski, director, Field
CTO, Sophos.

“If the public and the private sectors can continue to galvanize as a group
effort to help businesses, we can continue to improve our ability to recover
quickly and gather intelligence to protect others or even potentially hold those
conducting these attacks responsible,” Wisniewski continued.

Recent in-the-field findings from Sophos X-Ops’ report highlighted the continued
threat of ransomware to small-and-medium sized businesses. Data from more than
150 incident response (IR) cases in 2023 found that ransomware was, for the
fourth year running, the most frequently encountered attack type, occurring in
70% of IR cases Sophos X-Ops investigated.

“While improving cooperation and working with law enforcement after an attack
are all good developments, we need to move from simply treating the symptoms of
ransomware to preventing those attacks in the first place. Our most recent
Active Adversary report showed that many organizations are still failing to
implement key security measures that can demonstrably reduce their overall risk
profile; this includes patching their devices in a timely manner and enabling
multi-factor authentication. From the law enforcement side, while they have had
some recent successes with takedowns and arrests from LockBit to Qakbot, these
successes have proven to be more akin to temporary disruptions than longer term
or permanent wins.

“Criminals are successful in part due to the scale and efficiency with which
they operate. To beat them back, we need to match them in both these areas. That
means that, going forward, we need even greater collaboration, both within the
private and public sector—and we need it at a global level,” said Wisniewski.

“At the Bureau, we’ve been doubling down in particular on our work with the
private sector, in their capacity as victims of cyberattacks, of course, because
the mission of the FBI always has been—and always will be—victim-centric—but
also as integral partners, who can share valuable information about threats and
trends, and, increasingly, join in our operations themselves,“ said Christopher
Wray, FBI director.

Data for the State of Ransomware 2024 report comes from a vendor-agnostic survey
of 5,000 cybersecurity/IT leaders conducted between January and February 2024.
Respondents were based in 14 countries across the Americas, EMEA and Asia
Pacific. Organizations surveyed had between 100 and 5,000 employees, and revenue
ranged from less than $10 million to more than $5 billion.





More about
 * cybersecurity
 * incident response
 * law enforcement
 * ransomware
 * report
 * Sophos

Share


FEATURED NEWS

 * Attackers may be using TunnelVision to snoop on users’ VPN traffic
   (CVE-2024-3661)
 * MITRE breach details reveal attackers’ successes and failures
 * Veeam fixes RCE flaw in backup management platform (CVE-2024-29212)

eBook: CISSP fundamentals in focus



SPONSORED

 * eBook: Do you have what it takes to lead in cybersecurity?
 * eBook: Why CISSP?
 * The CISO’s guide to reducing the SaaS attack surface




DON'T MISS

 * Attackers may be using TunnelVision to snoop on users’ VPN traffic
   (CVE-2024-3661)
 * Photos: RSA Conference 2024
 * MITRE breach details reveal attackers’ successes and failures
 * Veeam fixes RCE flaw in backup management platform (CVE-2024-29212)
 * The complexities of third-party risk management




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×