{"id":6329,"date":"2021-06-03T09:41:11","date_gmt":"2021-06-03T13:41:11","guid":{"rendered":"https:\/\/www.technewsday.com\/?p=6329"},"modified":"2021-08-03T11:02:10","modified_gmt":"2021-08-03T15:02:10","slug":"how-malware-gangs-infiltrate-systems-to-steal-data","status":"publish","type":"post","link":"https:\/\/technewsday.com\/staging\/how-malware-gangs-infiltrate-systems-to-steal-data\/","title":{"rendered":"How Malware Gangs Infiltrate Systems To Steal Data"},"content":{"rendered":"\n<p>In an interview with Tech Republic, vice president of cybersecurity at Okta, Marc Rogers noted that contrary to the opinions of many, ransomware gangs are not the real attackers instead, they offer a service called ransomware-as-a-service which involves recruiting and providing technical support to their partners, which infiltrates companies.<\/p>\n\n\n\n<p>This comment referred to the explanation of how malware gangs infiltrate and steal data<\/p>\n\n\n\n<p>For him, Malware gangs break in through brute force attacks on passwords that come from breaches or known software vulnerabilities that have long been known and should be patched.<\/p>\n\n\n\n<p>He also said that DarkSide affiliates scan the internet for companies with open systems and known old vulnerabilities.<\/p>\n\n\n\n<p>Since the discovery of known old vulnerabilities tells attackers three things, including the fact that there is a way in, the likelihood that the company has bad practices inside, and finally the company&#8217;s unpreparedness for the attack, the attackers then investigate whether the company is a high-value target.<\/p>\n\n\n\n<p>If the company is a high-value target, they will go ahead and infect the network while taking over as many systems as possible.<\/p>\n\n\n<p>For more information, read the <a href=\"https:\/\/www.techrepublic.com\/article\/ransomware-as-a-service-how-darkside-and-other-gangs-get-into-systems-to-hijack-data\/\" target=\"_blank\" rel=\"noopener\">original story<\/a> in Tech Republic.<\/p>\n<p>Or, watch the <a href=\"https:\/\/www.techrepublic.com\/videos\/darkside-and-other-gangs-exploit-companies-that-arent-prepared-for-ransomware-attacks\/\" target=\"_blank\" rel=\"noopener\">video interview<\/a> in Tech Republic.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ransomware gangs infiltrate systems through a service called ransomware-as-a-service, says VP of cybersecurity at Okta.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[],"class_list":["post-6329","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/comments?post=6329"}],"version-history":[{"count":4,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6329\/revisions"}],"predecessor-version":[{"id":6357,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/posts\/6329\/revisions\/6357"}],"wp:attachment":[{"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/media?parent=6329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/categories?post=6329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technewsday.com\/staging\/wp-json\/wp\/v2\/tags?post=6329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}