As the FBI continues to work tirelessly in an effort to fight the latest ransomware epidemic, they’re now calling on victims of ransomware attacks to come forward promptly and share the details of their story.

The FBI claims to be having a difficult time fully grasping the depth of this ransomware epidemic due in part to the victim’s reticence in coming forward. This is due to many reasons, including: concerns over privacy, business reputation, regulatory data breach reporting requirements, and even out of sheer embarrassment.  

The FBI is still urging victims to come forward and report these ransomware incidents regardless of the outcome, in order to help provide law enforcement with a better understanding on the ransomware threat. By knowing more information about the victims and their experience with ransomware, the FBI will be better able to determine who’s actually behind these malicious attacks and how they are targeting their victims.

The FBI is asking for victims to come forward and share this information:

  • Date of the Infection
  • Ransomware Variant- identified on the ransom page or by the encrypted file extension
  • Victim Company Information- industry type, business size, etc.…
  • How the Infection Occurred- link in email, browsing the Internet, etc.…
  • Requested Ransom Amount
  • Actor’s Bitcoin Wallet Address- may be listed on the ransom page
  • Ransom Amount Paid- if any
  • Overall Losses Associated with a Ransomware Infection- including the ransom amount
  • Victim Impact Statement

This plea from the FBI is evidence that we’re battling against an incredibly destructible force that’s becoming a serious threat in the enterprise market.

NNT’s CTO advises, “A two-pronged approach is the only way to defend against ransomware attacks- get layered defenses in place, but also back it up with real-time host intrusion detection through File Integrity Monitoring, ensuring that if a cyber-attack proves successful, at the very least you get to know about it.”


Read this article on SCMagazine



The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.