Facebook Pixel {العنوان: سلسلة} | {اسم المغناطيس: سلسلة} - {الفئة: سلسلة} - اقرأ هذه القصة على Magzter.com
استمتع بـUnlimited مع Magzter GOLD

استمتع بـUnlimited مع Magzter GOLD

احصل على وصول غير محدود إلى أكثر من 9000 مجلة وصحيفة وقصة مميزة مقابل

$149.99
 
$74.99/سنة

يحاول ذهب - حر

"I've done a bit of deep-diving myself and found some technical stuff that the FBI didn't"

July 2025

|

PC Pro

Davey indulges in time travel with hackers who have earned the ire of the FBI

- DAVEY WINDER

"I've done a bit of deep-diving myself and found some technical stuff that the FBI didn't"

Wouldn’t it be nice to live in a world where things weren’t quite so crazy? No, I'm not talking about the fascinating real-world cartoon that is President Orange and his sidekick, Space Karen, but rather one where ransomware actors weren't still a massive threat to your networks, data, reputation and bank balance. But here we are.

Despite FBI disruption, hair-pulling and squabbling within criminal groups (Black Basta I'm looking at you) and a generally improved defensive posture against ransomware, the threat is not only evolving but surging.

One report, from a group of threat intelligence experts at Ontinue, revealed a 132% increase in ransomware attacks in quarter one of the year compared to the quarter before. This comes at the same time as the amount of money actually being paid to scumbag attackers dropping by 35%, no doubt in response to a harsher regulatory and legal playing field. When I spoke to Casey Ellis, the founder of the Bugcrowd bug bounty hacking platform, he warned that “the ransomware business model is an arms race, and threat actors are nothing if not adaptable.” Sadly, he is far from being wrong.

Ransomware as a service

Which is where Medusa enters stage left. As well as the ransomware threat seeing a bulk shift from network lockdown to data exfiltration, there has been a shift behind the scenes in the way the criminals operate.

One of the biggest evolutionary moves has been towards providing ransomware-as-a-service models. To explain, the more “traditional” model involves the developer (and therefore the brains behind the operation) taking a slice of the victim payment pie while the affiliates who do the attack donkey work grab an even bigger chunk of the ill-gotten gains.

المزيد من القصص من PC Pro

PC Pro

PC Pro

LG UltraFine 6K Evo

Thunderbolt 5 connectivity and a 6K resolution both impress, but at this price we want OLED technology

time to read

3 mins

April 2026

PC Pro

PC Pro

Motorola signature

One of the most stylish phones in the universe, but that comes with a matching price and two compromises

time to read

3 mins

April 2026

PC Pro

PC Pro

Geekom X14 Pro

The CPU may be ageing, but Geekom's debut laptop delivers in every other area - if you can find it for sale

time to read

3 mins

April 2026

PC Pro

PC Pro

Asus Zenbook Duo (2026)

With a next-gen processor and numerous design improvements, this is the best dual-screen laptop yet

time to read

3 mins

April 2026

PC Pro

PC Pro

Dell UltraSharp 52 Thunderbolt Hub Monitor

A superb choice for anyone who currently finds themselves with three or more monitors sitting on their desk

time to read

5 mins

April 2026

PC Pro

PC Pro

Investors may still believe in Elon Musk, but Jon Honeyball isn't buying any of it

My day started badly. Still bleary-eyed at 6am, with a bucket of coffee sitting untouched beside me, I dropped the SIM-removal tool into my keyboard.

time to read

3 mins

April 2026

PC Pro

PC Pro

Green cloud

Don't entrust your jobs to dirty, energy-hungry servers:

time to read

2 mins

April 2026

PC Pro

PC Pro

"I've said it before, and I'll say it again: the biggest obstacle to security is inconvenience"

Have you seen those password books on Amazon? They're not a cybersecurity abomination, despite what you may think

time to read

7 mins

April 2026

PC Pro

PC Pro

"Cyber resilience is now treated as a matter of governance rather than pure technical compliance"

Rule Britannia, Britannia waives the rules... or why the shoulder-shrugging Cyber Security and Resilience Bill causes such problems for UK businesses

time to read

6 mins

April 2026

PC Pro

PC Pro

"Not to point any fingers here; I seriously doubt the fault lies with our esteemed editor"

Whether it's PDFs from PC Pro's editor, Outlook messages or his partner's photos, space is at a premium for Steve this month

time to read

9 mins

April 2026

Listen

Translate

Share

-
+

Change font size