This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
ransomware_site_monitoring [2022/10/02 14:08] kaduuwikiadmin |
ransomware_site_monitoring [2023/05/22 20:40] (current) |
||
---|---|---|---|
Line 12: | Line 12: | ||
Kaduu is monitoring the following sites: | Kaduu is monitoring the following sites: | ||
- | {{: | + | {{: |
+ | |||
+ | ===== Why is it useful to monitor this? ===== | ||
+ | |||
+ | One would expect that the company affected by a ransomware attack would be the first to know about it. However, there are scenarios why this should be monitored: | ||
+ | |||
+ | a) Some companies are decentralized with different subsidiaries. The flow of information to a central location does not always work. In such cases, monitoring helps to keep track of the situation, even if a remote office abroad is affected by an attack. | ||
+ | |||
+ | b) It makes sense to also include suppliers and partners in the monitoring. For example, if a partner is hit by a ransomware attack, the company itself may also be affected. In the data of the attacked company (price lists, email communication, | ||
+ | |||
+ | ===== How to query? ===== | ||
+ | |||
+ | You can simply put the company name as a search criteria: | ||
+ | |||
+ | {{:: | ||
+ | |||
+ | When you click on the results, you see which ransomware type was used and the link to the according darknet website: | ||
+ | |||
+ | {{:: | ||
+ | |||