💰
Coveware Security Incident
Q3 2020
2010 days ago
Resolved
Incident Overview
Situation Description
The Coveware Quarterly Ransomware Report details trends in ransomware incident response during Q3 2020, noting an increase in ransom demands and the common practice of data exfiltration by ransomware groups.
Event Types
Ransomware
Extortion (non-ransomware)
Industry Sector
nanGeographic Scope
nanResponse Actions
Engaged Third-Party Forensic Investigators
Notified Affected Individuals & Entities
Impact Analysis
Event Types (2 identified)
Ransomware
Extortion (non-ransomware)
Financial Impact
$0 USDRecords Affected
0Data Types Compromised
PII (Personally Identifiable Information)
Intellectual Property
Credentials
Operational / System Data
Primary Impacts
Financial Loss
Data Exposure
Operational Disruption
Reputational Damage
Legal/Regulatory Penalties
Key Decisions Made
Coveware advises victims of data exfiltration extortion to expect that stolen data will not be credibly deleted and may be traded, sold, or held for future extortion.; Coveware recommends that victims of data exfiltration take responsible steps such as seeking advice from privacy attorneys, investigating what data was taken, and performing necessary notifications.; Coveware suggests that paying a threat actor to not leak stolen data provides almost no benefit to the victim.
Technical Analysis
Attack Method
Unknown
Threat Actor Attribution
Maze
Egregor
Ryuk
Sodinokibi
DopplePaymer
Conti
Wasted
Nephilim
Avaddon
Phobos
Snatch
Lockbit
Dharma
Sekhmet
Netwalker
Mespinoza
Vulnerability / Tool
RDP
Unpatched Vulnerability
Phishing
Additional Information
Quick Facts
- Company:
- Coveware
- Date:
- Q3 2020
- Status:
- Resolved
- Decision Maker:
- nan
- Position:
- nan
- Published:
- 2020
Source Information
Original Query
comparative analysis of operational downtime costs for paying vs not paying ransomTimeline
Information Published
2020
Incident Occurred
Q3 2020 (2010 days ago)
Status: Resolved
Estimated resolution based on age