Ransomware has been known for causing havoc to enterprises by encrypting data and asking for a ransom, however in recent times, Ransomware creators have taken things seriously by publishing the victim’s data on a hosted website. Maze ransomware first initiated this publishing behavior, when its victims denied to pay the ransom. Now DopplePaymer Ransomware creators have published a new website called ‘Dopple Leaks’ were it has disclosed the encrypted data of few companies that it had infected.
With DopplePaymer following up with Maze’s tactics of exposing victim’s data, Sodinokibi, and Nemty have also stated that they would probably follow the same in future.
DopplePaymer is an enterprise targeted malware that infiltrates networks, gain access to administrator credentials and eventually spread to the network devices to break the productivity, integrity and confidentiality of the enterprise. Below is the site that creators of DopplePaymer had created, the Dopple leaks.
As per DopplePaymer ransomware creators, four companies that become victim to their attack and had not paid the ransom yet.
Ransomware is no longer just an encrypting malware that demands for ransom, with Maze and DopplePaymer ransomware creators publishing victim’s data, this is now threatening companies for data breaches and could even result in penalization from data law regulatory organizations.
Enterprises are requested to keep their proactive and reactive security up 24/7 and if in case they became victim to a cyberattack and could lose employees, vendor, client or personal data of any entity it is always good to disclose the attack, this way they can at least caution the affected entities.
Subscribe to ‘The Cybersecurity Times’, for daily alerts on cyber events. You can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…
View Comments
21825 929571I saw your post awhile back and saved it to my computer. Only recently have I got a chance to checking it and have to tell you nice work. 89378
Well I truly liked studying it. This information provided by you is very helpful for correct planning.
365 pills viagra cialis professional cialis online mastercard buy cialis on liuner