Ransomware groups are no longer content with simply encrypting a victim’s files. To put more pressure on the target to pay up, threat actors have taken to stealing data and — if the victim refuses to pay the ransom — posting it online for all to see. In this article, we’ll explore how data exfiltration works and discuss various detection and mitigation strategies.

 
Learn about data exfiltration
 

We wish you a nice malware-free day!

Christian Mairoll

Emsisoft Founder & Managing Director

 
   
 
 
Emsisoft Logo


Publisher: Emsisoft Ltd - 315a Hardy St - Nelson 7010 - New Zealand
Company number: 5377101 - Web: contact page

Unsubscribe