WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Another Ransomware Roundup – June 17, 2020
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Another Ransomware Roundup – June 17, 2020

Author: Jennifer Walker

Created: Thursday, June 17, 2021 - 18:24

Categories: Cybersecurity

There is still no shortage of ransomware posts this week. Here are a few of the more notables:

But for the Grace of Backups. Backups are great, but their effectiveness to enable restoration after a ransomware attack depends on a number of factors, such as the integrity of the backups (have they been tested/validated), the availability of the backups (if you keep a copy offline), or even the availability of the backup system used to restore (if the attacker found and encrypted/destroyed the backup system too). Check out SC Magazine for why backups are not the panacea for recovery from a ransomware attack.

It’s Time to Rachet-Up Ransomware Resilience. Mimecast takes a look at organizations investing more in cybersecurity to help combat ransomware. Check out mimecast to see how these organizations are stepping up their game.

Even Linux isn’t Safe from Ransomware. TrendMicro recently discovered ransomware using bash scripts targeting Linux distributions, they have dubbed this activity DarkRadiation. Upon investigating, they found the attack chain is fully implemented as a bash script, with perhaps more scripts to come. TrendMicro has seen bash scripts for Red Hat, CentOS, and Debian-based Linux distributions. Members are encouraged to send this article from TrendMicro to your Linux system administrators.

DARKSIDE Affiliates May Still be Active. Mandiant outlines activity from DARKSIDE affiliate UNC2465 days after the publicly reported shutdown of the overall DARKSIDE program. Mandiant believes that affiliate groups that have conducted DARKSIDE intrusions may use multiple ransomware affiliate programs and can switch between them at will. Read more at Fireeye.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar