• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

A Lone Wolf Accessed Clarkson PLC

August 28, 2018Simeon Georgiev

London-based shipping enterprise Clarkson PLC has decided to reveal some new details that are related to last year’s ransomware attack. According to ransomware removal reporters, last year a cybercriminal group infiltrated Clarkson’s systems and coerced the company to pay a certain amount of ransom. The company was threatened with an online leak of its organizational data in the case of non-compliance.

In the case of a security breach, many businesses are reluctant in the release of the entire details of the attack. If a customer’s data is compromised, often companies engage in malpractice and do not publicly admit it. Thus, cybercriminals are able to use a customer’s details for a number of crimes that include identity theft, phishing campaigns, etc, while the customer remains unaware concerning the data theft. The affected organizations indulge in such harmful practices to save their brand image.

However, Clarkson is an exception as it has continuously forewarned users that their data that was compromised in the ransomware attack and also stated that the cybercriminal group may release their data in online circles. Thus, customers were able to take safety measures in time. The ransomware removal industry kept track of the incident and waited for the cybercriminals to release the data but reportedly the cybercriminals did not proceed further.

The Lone Wolf

Ransomware removal analysts stated that a lone attacker was found out in the breach’s investigation. The Clarkson management was able to discover the ransomware’s infection on 7 November 2017. The security officials of the organization found a third-party had acquired illegal access to their systems as well as duplicated the stored data and sent it to their remote location. Subsequently, a ransom demand came for the return of data. Afterward, the company maintained its composure and contacted the relevant authorities and cyber security firms for their system’s restoration and ransomware removal.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Clarkson Recovers Data and Announces Identity Protection for the Affected Next post Eight Percent of Global Ransomware Attacks Affect Vietnamese Users

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

BitPaymer Ransomware Traced Back to Dridex Developers

February 1, 2018Simeon Georgiev
BitPaymer Ransomware Traced Back to Dridex Developers

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.