Views 285

Ransomware: Hackers Are Recruiting Your Employees


Ransomware is one of the biggest cybersecurity threats to businesses today, and cybercriminals can potentially make millions of dollars in a single successful attack. 

Now, cybersecurity researchers have discovered a ransomware campaign asking employees to install ransomware on their organization’s network, in return for a slice of the payout.

ransomware email example

Analysis of the files sent by the attacker indicated that they're distributing a version of “DemonWare” ransomware, which is freely available to download from GitHub. Its original author placed it there to demonstrate how easy it is to make ransomware.


Finding Targets through Social Networks

When analyzing social engineering, one of the biggest questions is ‘how did an actor initially get the target’s contact information?’ In this case, the attacker revealed he collects his targeting information from LinkedIn, which, in addition to other commercial services that sell access to similar data, is a common method scammers use to obtain contact information for employees. Then, he simply messages them with the offer. 

Concluding Remarks

Cyberattackers are relentless in looking for weaknesses to exploit- including in humans. Experienced ransomware operations benefit from finding insiders to help them gain access to networks. LockBit ransomware – which has surged in popularity in recent months – regularly advertises for insiders to help carry out ransomware.


To prevent the network from being compromised with ransomware – be it via an outside intrusion or an insider threat – ICS recommends Blackpoint Security. Other cybersecurity products on the market today lack the most important capability: real-time threat response. The reality is that attackers will find a way to breach a network no matter how many preventative measures are put in place, as the ransomware “invitation” above illustrates. When the attacker bypasses the defenses, tools must already be in place to put an end to the attack before mayhem occurs. Blackpoint provides such threat response: detaining infected devices instantly, kicking the hacker off the company network and saving critical assets.


Stop CYBER Threats in Real-time with Built-in, Immediate, and Effective Threat Response

ransomware threat response logo

Schedule a Demo Now

If you have any questions, please feel free to contact us at: (201) 280-9160

We Offer:

  • Microsoft Silver Certified Partner
  • Dynamic Support | Managed IT
  • Cloud Computing for Business
Our NJ Services AreaOur NJ Service Area