• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Ransomware Attackers Now Publishing Stolen Data

As security software advances to help enterprises navigate a ransomware attack, cybercriminals are starting to dox compromised businesses.

December 19, 2019 Zachary Comeau Leave a Comment

Ransomware, ransomware attacks

As if holding your data hostage for large sums of money wasn’t bad enough, cybercriminals are now starting to publish data stolen from those victims who don’t pay up after ransomware attacks.

According to internet security journalist Brian Krebs, several well-known hacker groups have signaled that they plan to start publishing the kidnapped data on public websites. That will identify their victims that have chosen to rebuild rather than submit to the ransom demand.

Earlier this week, hackers behind the Maze Ransomware strain started a public website that lists the company names and websites for eight victims that declined to pay.

According to Krebs, that information includes the date of infection, Microsoft Office, text and PDF files, the total volume of files stolen, IP addresses and machine names of infected servers.

Krebs cited Lawrence Abrams, founder of security blog BleepingComputer.com, who said ransomware attacks now need to be treated like data breaches. That can have huge implications for your business, especially if the status quo is to try to keep ransomware attacks quiet.

“Even though this should be considered a data breach, many ransomware victims simply swept it under the rug in the hopes that nobody would ever find out,” Abrams said. “Now that ransomware operators are releasing victim’s data, this will need to change and companies will have to treat these attacks like data breaches.”

According to Krebs, this shift in how ransomware attackers operate can add on to the problems companies already face for failing to report data breaches, especially for U.S. healthcare providers who are legally required to report incidents to the federal government.

“While these victims may be able to avoid reporting ransomware incidents if they can show forensic evidence demonstrating that patient data was never taken or accessed, sites like the one that Maze Ransomware has now erected could soon dramatically complicate these incidents,” Krebs wrote.

Data should always be backed up and stored on a separate device so hackers aren’t able to hold that ransom as well, but there are several things you can do to prevent ransomware attacks in the first place.

What to do to prevent ransomware attacks:

  • Update your computer. Vulnerable applications and operating systems are the target of most ransomware attacks, so you should make sure you and your employees are equipped with the latest versions of your company’s operating systems.
  • Tread lightly when you click. Pay attention to the domain on links, especially when they’re emailed to you. Malicious websites will look almost identical to one’s your familiar with but may be slightly misspelled or use a different domain from the legitimate site. The same goes for opening email attachments, especially when they’re compressed files or ZIP files.
  • Speaking of emails, verify the email is legitimate by reaching out to sender directly via a previous legitimate email from the same sender.
  • This goes without saying, but you should be equipped with the latest antivirus software, firewall and email filters.

Read Next: The Worst Cyber Attacks of 2019: Biggest Breaches & Expensive Consequences

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cybersecurity, Krebs, ransomware

Related Content:

  • Yealink MeetingBoard Pro Yealink Launches MeetingBoard Pro to Elevate Meeting Equity…
  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.