ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 19 - D-SF-A-24 discussion

Report
Export

During the analysis, the threat intelligence team disclosed that attackers not only encrypted files, but also attempted to encrypt backups and shared, networked, and cloud drives.

Which type of ransomware is used for this attack?

A.
Cryptolocker
Answers
A.
Cryptolocker
B.
Double extortion
Answers
B.
Double extortion
C.
Crypto
Answers
C.
Crypto
D.
Locker
Answers
D.
Locker
Suggested answer: B

Explanation:

Double Extortion Ransomware: This type of ransomware not only encrypts files but also attempts to encrypt backups and shared, networked, and cloud drives1.

Attack Method: Attackers first exfiltrate sensitive data before encrypting it, then threaten to release the data if the ransom is not paid, hence the term 'double extortion'1.

Impact on Organizations: This method increases the pressure on the victim to pay the ransom, as they face the risk of their sensitive data being published or sold1.

Prevention and Response: Organizations should implement robust backup strategies, including offsite and offline backups, and have an incident response plan that includes dealing with ransomware and data breaches1.

Double extortion ransomware attacks are particularly dangerous because they combine the threat of data encryption with the threat of data exposure, significantly increasing the potential damage to the victim organization1.

asked 16/09/2024
bebo here
42 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first