Fraud Management & Cybercrime , Incident & Breach Response , Managed Detection & Response (MDR)

Multistage Ransomware Attacks Threaten Critical Infrastructure

Cybereason CISO Israel Barak Shares Latest Honeypot Findings
Israel Barak, CISO, Cybereason

Cybereason’s latest honeypot-based research has found a surge in threat actors targeting North American and European critical infrastructure providers with multistage ransomware attacks. CISO Israel Barak says these strikes are not only increasingly prevalent, but concerning.

See Also: The Need for Enterprise Breach Remediation

The company's honeypot research - a follow-up study to one from 2018 - involved a system it built to resemble an electricity company with operations in North America and Europe. Researchers' goal: to analyze the tactics, techniques and procedures used by state-sponsored groups and cybercrime actors.

In a video interview with Information Security Media Group, Barak details key findings from the honeypot research, including:

  • Details about multistage ransomware attack patterns;
  • Where critical infrastructure providers remain most vulnerable;
  • Tips to improve detection, response and resiliency.

Barak is a cyber defense expert, with his extensive background established at the Israeli Defense Forces. As Cybereason’s CISO, Barak is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.