What is Extortionware? Cyber Terms Explained

Featuring: Tal Mozes, CEO & Co-Founder, Mitiga

Extortionware in the cloud usually means that an attacker managed to leak or compromise some of your sensitive data and is threatening to release that data, and also show the world by releasing this data that they have managed to compromise your organization and hurt your reputation.

We've also seen different types of extortionware, which involves regulators like the SEC, and attackers threatening to go to the SEC, and report that they managed to compromise your data. In these types of cases, it's key to understand as quickly as possible, which data was compromised, when it was compromised, and where from. Those answers will help the negotiator that will negotiate with the attackers about the price and if to pay or not, to really understand what that attacker really had - is the data is truly sensitive or it's not as important to the organization, and exactly what to report.

Now, usually it takes days or weeks to investigate these kinds of questions. If you have all the logs in advance, they're all already digested, and you have some sort of automation in order to investigate them, you can get some of those answers within minutes or hours to help the negotiator with the negotiation process; and that will put you in a completely different position in that type of incident. 

Learn how Mitiga helps teams swiftly combat extortionware.

Video

What Is Cloud Investigation? Cyber Terms Explained

Maybe before we dive deep into cloud investigation, let's talk about what is the cloud that we're referring to in cybersecurity? Because the cloud has different parts in your organization.

Video

What is Cloud Incident Response? Cyber Terms Explained

Cloud incident response, process-wise, is not very different than a regular incident response—which is the process once we realize we have been breached. We need to start investigating what has happened, what is the impact, when did it happen, and what we need to return to business as usual as soon as possible.

Video

What is a Security Data Lake? Cyber Terms Explained

When we talk about a Security Data Lake, Data Lake is not a very new concept. It's the concept of aggregating alot of data from different resources into a centralized repository.