What is Extortionware? Cyber Terms Explained

Featuring: Tal Mozes, CEO & Co-Founder, Mitiga

Extortionware in the cloud usually means that an attacker managed to leak or compromise some of your sensitive data and is threatening to release that data, and also show the world by releasing this data that they have managed to compromise your organization and hurt your reputation.

We've also seen different types of extortionware, which involves regulators like the SEC, and attackers threatening to go to the SEC, and report that they managed to compromise your data. In these types of cases, it's key to understand as quickly as possible, which data was compromised, when it was compromised, and where from. Those answers will help the negotiator that will negotiate with the attackers about the price and if to pay or not, to really understand what that attacker really had - is the data is truly sensitive or it's not as important to the organization, and exactly what to report.

Now, usually it takes days or weeks to investigate these kinds of questions. If you have all the logs in advance, they're all already digested, and you have some sort of automation in order to investigate them, you can get some of those answers within minutes or hours to help the negotiator with the negotiation process; and that will put you in a completely different position in that type of incident. 

Learn how Mitiga helps teams swiftly combat extortionware.

Video

Cloud Security and Cyber Insurance Experts Help Organizations Learn How to Mitigate Cloud and SaaS Threats

We really need to define and understand “Where is the border between our security or what we invest in cybersecurity as a client, and between the infrastructure?” And sometimes because they're so big and because they are, we trust that they have everything, is that a right presumption from our side?

Video

Protecting Data and Access in Cloud Environments

When we're talking about this modern era now, what new challenges do you need to address that are different in terms of access, data, and identity that perhaps are different than things you might've had to think about a couple years back?

Video

Get to Know Mitiga: Cloud and SaaS Threat Detection, Investigation, and Response Leader

After 25 years of experience in cybersecurity, we came to a conclusion that in cloud detection, investigation, and response, there is still no single good solution that can oversee the entire landscape of the digital footprint.