Discussion about this post

User's avatar
Neural Foundry's avatar

Solid approach using backups instead of paying ransom. Ten days of undetected access is concerning though - that's a huge window for lateral movement and data exfil. The phishing vector combined with that dwell time shows why modern backup strategies need to go beyond just having copies. I've seen scenarios where attackers specifically target backup infrastrucure to force the ransom payment, so air-gapped or immutable backups are becoming kinda essential.

No posts

Ready for more?