Ransomware groups are no longer content with simply encrypting a victim’s files. To put more pressure on the target to pay up, threat actors have taken to stealing data and — if the victim refuses to pay the ransom — posting it online for all to see. In this article, we’ll explore how data exfiltration works and discuss various detection and mitigation strategies.
We wish you a nice malware-free day!
|