In this article, we discuss today’s most prevalent types of ransomware attacks, considerations for whether to make the ransom payment, the Financial Crimes Enforcement Network (FinCEN) and Treasury’s Office of Foreign Asset Control’s (OFAC) ransomware guidance, and the U.S. government’s efforts in connection with these attacks.

Click here to read the full article, published by

Jena M. Valdetero, co-chair of Greenberg Traurig’s U.S. Data, Privacy and Cybersecurity Practice, presented “Solving the Ransomware Puzzle Do You Have All the Pieces in Place?” on April 25 at the 20th Annual Continuity Insights Management Conference in Louisville, Kentucky.

The session walked through all aspects of preparation for a ransomware attack,

Russia’s attack on Ukraine has resulted in historic and escalating U.S. sanctions, impacting companies who do business with Russia or Russian-affiliates and creating risks even for companies who do not. Since 2020, the number and sophistication of ransomware attacks has spiked, largely perpetuated by organized criminal groups in Russia and Eastern Europe. In light of

On Feb. 25, 2022, one of the top 10 ransomware threat actor groups, Conti, issued a statement announcing its “full support” of the Russian government and threatening “to use all our possible resources to strike back at critical infrastructures of an enemy” who “organize[s] a cyberattack or any war activities” against Russia. Conti followed up

A ransomware attack on a major U.S. gas pipeline sharpened people’s concerns about cybercrime in 2021, while the Biden administration balanced working with the private sector and threatening penalties for keeping breaches secret. GT Shareholder Jena M. Valdetero was mentioned in this article on cybersecurity steps the Biden administration has taken, published by Law360 Dec.

December 2021 has brought with it holiday cheer and an uptick in distributed denial of service attacks (DDOS) attacks. DDOS attacks are fast becoming a new tool in the extortionist threat actor’s toolkit. DDOS attacks are attractive because they don’t require attackers to actually hack into a company’s systems. Instead, a DDOS attack targets a

On May 6, 2021, Colonial Pipeline was attacked by ransomware suspected to have originated in Eastern Europe or Russia, allowing cyber criminals to penetrate a major utility with significant impact on the entire US eastern seaboard’s economy. From the perspective of vulnerability, the Colonial Pipeline attack was a significant wake-up call–a Pearl Harbor moment for

The Fourth of July is usually reserved for fireworks, and this year was no different. On July 2, 2021, Kaseya, a provider of IT and security-management solutions, announced that it was the target of a supply-chain ransomware attack by the REvil/Sodinokibi (REvil) organized ransomware group. Kaseya’s virtual systems/server administrator (VSA) is a server and cloud-based

Recent major ransomware attacks against U.S. companies and infrastructure have been dominating the headlines. This 30-minute webinar led by our data security practice will provide an overview of recent threat trends related to ransomware and how companies can prepare to address this growing risk and respond effectively.

  • Newly aggressive threat actor tactics
  • A step-by-step guide

Given the circumstances of most ransomware attacks, likely yes.

The EDPB issued practical guidance on various types of data breaches, giving top billing to ransomware attacks. Given the recent increase in ransomware attacks likely due to the sudden shift to remote work in response to COVID-19, the EDPB’s guidance focuses extensively on ransomware attacks. In