GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Ransomware Content

Conti Ransomware

Conti Ransomware

The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have observed the increased use of Conti ransomware in more than 400 attacks on U.S. and…

Learn More
Ransomware Guide

Ransomware Guide

Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in…

Learn More
Ransomware Threat Report 2022

Ransomware Threat Report 2022

Unit 42 has compiled the 2022 Ransomware Threat Report to help put all this ransomware activity into context and offer a better understanding of the scope of the ransomware landscape…

Learn More
Ransomware Resiliency in the Age of Zero Trust

Ransomware Resiliency in the Age of Zero Trust

Federal agencies have had rapid growth of digital transformation with the introduction of new systems to support remote work and ‘online everything’ for both citizen-facing and mission-critical services. As a…

Learn More
Ransomware and Federal Law: Cybercrime and Cybersecurity

Ransomware and Federal Law: Cybercrime and...

Exploring legal issues implicated by two potential approaches to combatting ransomware, this report first summarizes the potential for criminal prosecution under federal statutes such as the Computer Fraud and Abuse…

Learn More
Preparing Your Organization For Ransomware Attacks

Preparing Your Organization For Ransomware Attacks

What do you do if your computer suddenly displays a countdown clock and a message telling you that your files have been encrypted and will be permanently lost to you…

Learn More
Tips & Tactics on Ransomware

Tips & Tactics on Ransomware

Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help organizations protect against ransomware attacks…

Learn More
Ransomware: What It Is & What To Do About It

Ransomware: What It Is & What To Do About It

The National Cyber Investigative Joint Task Force (NCIJTF) has created a joint-seal ransomware fact sheet providing the public with important information on the current ransomware threat, the government’s response, as…

Learn More
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events

Data Integrity: Detecting and Responding to...

Ransomware, destructive malware, insider threats, and even honest mistakes present an ongoing threat to organizations that manage data in various forms. Database records and structure, system files, configurations, user files,…

Learn More
Ransomware Risk Management: A Cybersecurity Framework Profile

Ransomware Risk Management: A Cybersecurity...

Ransomware is a type of malicious attack where attackers encrypt an organization's data and demand payment to restore access. In some instances, attackers may also steal an organization's information and…

Learn More
Cybersecurity Framework Profile for Ransomware Risk Management

Cybersecurity Framework Profile for Ransomware...

Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. In some instances, attackers may also steal an organization’s information and…

Learn More
Breaking the Ransomware Cycle: U.S. National Policy Options

Breaking the Ransomware Cycle: U.S. National...

Holding objects of value hostage until a ransom is paid for their release is an ancient vice, but it has acquired special salience in the digital age, as cyber criminals…

Learn More
Mitigating the Impacts of Doxing on Critical Infrastructure

Mitigating the Impacts of Doxing on Critical...

Doxing refers to the internet-based practice of gathering an individual’s personally identifiable information (PII —or an organization’s sensitive information— from open source or compromised material and publishing it online for…

Learn More
2021 Ransomware Case Study: Identifying High Priority Security Controls for Public Institutions

2021 Ransomware Case Study: Identifying High...

Recent history indicates U.S. municipalities, K-12 education systems, and utility service providers are profoundly vulnerable, with the effects of ransomware attacks on public institutions disrupting the everyday lives of Americans.…

Learn More
Colonial Pipeline: The DarkSide Strikes

Colonial Pipeline: The DarkSide Strikes

On May 8, 2021, the Colonial Pipeline Company announced that it had halted its pipeline operations due to a ransomware attack, disrupting critical supplies of gasoline and other refined products…

Learn More