User Tools

Site Tools


ransomware_site_monitoring

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
ransomware_site_monitoring [2022/11/01 20:32]
kaduuwikiadmin
ransomware_site_monitoring [2023/05/22 20:40] (current)
Line 14: Line 14:
 {{:sites_ransom.png?300|}} {{:sites_ransom.png?300|}}
  
-===== Why does this makes sense to monitor? =====+===== Why is it useful to monitor this? =====
  
 One would expect that the company affected by a ransomware attack would be the first to know about it. However, there are scenarios why this should be monitored: One would expect that the company affected by a ransomware attack would be the first to know about it. However, there are scenarios why this should be monitored:
Line 21: Line 21:
  
 b) It makes sense to also include suppliers and partners in the monitoring. For example, if a partner is hit by a ransomware attack, the company itself may also be affected. In the data of the attacked company (price lists, email communication, contracts, etc.), the own company can also be mentioned. b) It makes sense to also include suppliers and partners in the monitoring. For example, if a partner is hit by a ransomware attack, the company itself may also be affected. In the data of the attacked company (price lists, email communication, contracts, etc.), the own company can also be mentioned.
 +
 +===== How to query? =====
 +
 +You can simply put the company name as a search criteria:
 +
 +{{::ransomware_search.png?800|}}
 +
 +When you click on the results, you see which ransomware type was used and the link to the according darknet website:
 +
 +{{::ransomware_result.png?800|}}
  
  
  
  
ransomware_site_monitoring.1667331165.txt.gz ยท Last modified: 2023/05/22 20:40 (external edit)