I agree but will point out that many state level organizations (small agencies or offices) have poor to little in the way of backups. I suspect many small or medium size companies are the same way. If the data was valuable, as a sellable resource, it would have a small market. On the other hand the data or loss of said data could destroy these same people but would fetch some money if it was still in place but just not available. People may not have saleable resources but may be willing to redeem their lost data for some money.
Jon On Fri, Oct 30, 2009 at 7:56 AM, <[email protected]> wrote: > Ransomware works because you know one party that definitively has a high > value on the data you have obtained. > > A 3rd party will probably not place such a high value on the same data, or > you'd have to obtain more of it to get similar value. > > It all depends on the org and the type of data and the goals of the > intruder. > > Andrew S. Baker (ASB) > > Sent from my Verizon Wireless BlackBerry > ------------------------------ > *From: *"Ziots, Edward" <[email protected]> > *Date: *Fri, 30 Oct 2009 07:41:20 -0400 > *To: *NT System Admin Issues<[email protected]> > *Subject: *RE: Ransomware > > I think a lot of companies, don’t consider this a big enough risk, or it > doesn’t come up on there radar, until they get hit, and are in reactive > mode, and the ohh crap button has been pushed. I still think that convert > attacks are still the preferred method of information leakage and retrieval, > just from a hacking prespective, if I can penetrate your systems and siphon > off the juicy info I want, without you even knowing, then I can use your > data (crown jewels, because its all about the data) to sell to the highest > bidder. > > > > Why even go the route of ransonware for the data and let them know its > stolen in the first place? Its that like tipping the unsuspecting company, > user that something is afoul, especially when they “think” (Notice Think, > not Know, or have a clue) that there systems might have been compromised and > information could have just gone out there internet pipe without them > noticing it. > > > > Just my 2 thoughts… > > > > Z > > > > > > Edward Ziots > > Network Engineer > > Lifespan Organization > > MCSE,MCSA,MCP+I, ME, CCA, Security +, Network + > > [email protected] > > Phone:401-639-3505 > ------------------------------ > > *From:* Marc Maiffret [mailto:[email protected]] > *Sent:* Thursday, October 29, 2009 8:28 PM > *To:* NT System Admin Issues > *Subject:* Re: Ransomware > > > > Another on the list of reasons of why it drives me insane that so many > companies still sit around saying the same thing year after year: > > > > Why would anyone come after me? I am joe small business in joe small town. > I am not wells fargo. > > I have never had an incident before beyond the normal spyware and such. > > > > Questions and comments which are so easily slain as are the servers and > workstations of the people whom make them. > > > > Two types of people call by company, the ones whom are looking to be > proactive and avoid the pain of what a breach can turn into and the ones > whom thought like the people above whom now are looking for people to help > clean up the mess. > > > > -Marc Maiffret > > www.marcmaiffret.com > > > > On Wed, Oct 28, 2009 at 12:05 PM, Roger Wright <[email protected]> wrote: > > Spyware, Malware, Scareware, etc.... now we have Ransomware. > > http://blogs.zdnet.com/security/?p=4748 > > > Roger Wright > ___ > > Sent from Tampa, FL, United States > > > > > > > > > > > > > > > > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
