WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Ransomware – Another Compendium
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Ransomware – Another Compendium

Author: Jennifer Walker

Created: Monday, November 16, 2020 - 21:21

Categories: Cybersecurity, General Security and Resilience, Security Preparedness

While there were not a lot of high-profile incidents, it was another busy week in ransomware, particularly in the evolution of tactics to coerce victims into paying, as we reported last week in Let Me Show you my Shocked Face for $1000, Alex.

However, we start off with BleepingComputer’s “The Week in Ransomware” for November 13, for a litany of new variants of existing ransomware families to keep an eye out for.

Egregor was active over the weekend, and after encrypting files on a device, it reportedly printed ransom notes to attached printers.

If you keep wondering why ransomware is running rampant, that’s because Ransomware-as-a-Service (RaaS) offerings are more rife than you might ruminate. In addition to Dharma, reported in the Security & Resilience Update for August 13, 2020, Intel471 examines approximately twenty-five RaaS offerings across various tiers being advertised on the cybercrime underground, including the likes of Ryuk, Conti, DoppelPaymer, Egregor, and REvil.

But despite the continual evolution of tactics, being resilient to ransomware isn’t rocket-science. There are five common methods ransomware groups leverage to infect victims. Red Canary highlights these five pitfalls and associated quick-wins to overcome malicious email attachments, compromise of external facing assets, malicious code injection into known system processes, sub-optimal asset management, and human error.

Related Resources

Members Only

(TLP:AMBER+STRICT) Situation Report: Heightened Threat Environment – Potential Retaliation by Iranian Threat Actors Following U.S. Strikes on Iran (Updated May 7, 2026)

May 7, 2026 in Cybersecurity, OT-ICS Security, Physical Security, Security Preparedness
Members Only

(TLP:GREEN) Gate 15 TARGET Report – Identity Centric Attacks: The Shift from Network to Identity as the Primary Attack Surface

May 7, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Guidance for Careful Adoption of Agentic AI Services

May 7, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar