back to article Akira ransomware is encrypting victims again following pure extortion fling

Experts believe the Akira ransomware operation is up to its old tricks again, encrypting victims' files after a break from the typical double extortion tactics. That's according to James Nutland and Michael Szeliga, security researchers at Cisco Talos, who noted that the decision to revert to old ways is a sign the group is …

  1. Guy de Loimbard Silver badge
    Stop

    (92 percent) stemmed from unmanaged devices connected to the corporate network.

    If this doesn't make you sit up and listen I don't know what metric or snippet of information will.

    I'm still finding similar issues in every organisation I review, that issue is one of not having a full handle on the devices attached to one's network.

    All you can do is keep educating and hope people understand what a good posture looks like.

    Unfortunately convenience for the end user must come second place to the need for good security practices being put in place first.

  2. Prst. V.Jeltz Silver badge

    encrypting victims' files after a break from the typical double extortion tactics.

    Is encrypting for ransom old hat now?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like