London-based shipping enterprise Clarkson PLC has decided to reveal some new details that are related to last year’s ransomware attack. According to ransomware removal reporters, last year a cybercriminal group infiltrated Clarkson’s systems and coerced the company to pay a certain amount of ransom. The company was threatened with an online leak of its organizational data in the case of non-compliance.
In the case of a security breach, many businesses are reluctant in the release of the entire details of the attack. If a customer’s data is compromised, often companies engage in malpractice and do not publicly admit it. Thus, cybercriminals are able to use a customer’s details for a number of crimes that include identity theft, phishing campaigns, etc, while the customer remains unaware concerning the data theft. The affected organizations indulge in such harmful practices to save their brand image.
However, Clarkson is an exception as it has continuously forewarned users that their data that was compromised in the ransomware attack and also stated that the cybercriminal group may release their data in online circles. Thus, customers were able to take safety measures in time. The ransomware removal industry kept track of the incident and waited for the cybercriminals to release the data but reportedly the cybercriminals did not proceed further.
The Lone Wolf
Ransomware removal analysts stated that a lone attacker was found out in the breach’s investigation. The Clarkson management was able to discover the ransomware’s infection on 7 November 2017. The security officials of the organization found a third-party had acquired illegal access to their systems as well as duplicated the stored data and sent it to their remote location. Subsequently, a ransom demand came for the return of data. Afterward, the company maintained its composure and contacted the relevant authorities and cyber security firms for their system’s restoration and ransomware removal.